• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lu Guoqing, Zhang Xiaojian, Ding Liping, Li Yanfeng, Liao Xin. Frequent Sequential Pattern Mining under Differential Privacy[J]. Journal of Computer Research and Development, 2015, 52(12): 2789-2801. DOI: 10.7544/issn1000-1239.2015.20140516
Citation: Lu Guoqing, Zhang Xiaojian, Ding Liping, Li Yanfeng, Liao Xin. Frequent Sequential Pattern Mining under Differential Privacy[J]. Journal of Computer Research and Development, 2015, 52(12): 2789-2801. DOI: 10.7544/issn1000-1239.2015.20140516

Frequent Sequential Pattern Mining under Differential Privacy

More Information
  • Published Date: November 30, 2015
  • Frequent sequential pattern mining is an exploratory problem in the field of data mining. However, directly releasing the discovered frequent patterns and the corresponding true supports may reveal the individuals privacy. The state-of-the-art solution for this problem is differential privacy, which offers a strong degree of privacy protection by adding noise. Due to the inherent sequentiality and high-dimensionality in sequences, it is challenging to apply differential privacy to frequent sequential pattern mining. To address those problems, this paper presents a differentially private method called Diff-FSPM that uses an interactive way to find frequent patterns. To reduce the impact of dimensionality, Diff-FSPM first employs the exponential mechanism to obtain the optimal sequential length for truncating each sequence in the original dataset. After that, Diff-FSPM relies on a prefix-tree to compress all the frequent patterns, and then utilizes the Laplace mechanism to perturb the true support of the frequent patterns. To efficiently allocate the privacy budget, Diff-FSPM uses the closet frequent pattern and Markov assumption to guide the mining process. Finally, Diff-FSPM adopts a post-processing technique with consistency constraint to boost the accuracy of the returned noisy support counts. We theoretically prove that Diff-FSPM satisfies ε-differential privacy, and the experimental results show that it outperforms the existing methods in terms of utility.
  • Related Articles

    [1]LiFeng, PanJingkui. Human Motion Recognition Based on Triaxial Accelerometer[J]. Journal of Computer Research and Development, 2016, 53(3): 621-631. DOI: 10.7544/issn1000-1239.2016.20148159
    [2]Lü Zhiguo, Li Yan, Xu Xin. Research on Fast 3D Hand Motion Tracking System[J]. Journal of Computer Research and Development, 2012, 49(7): 1398-1407.
    [3]Liu Weibin, Liu Xingqi, Xing Weiwei, Yuan Baozong. Improving Motion Synthesis by Semantic Control[J]. Journal of Computer Research and Development, 2011, 48(7): 1255-1262.
    [4]Lu Jiyuan, Zhang Peizhao, Duan Xiaohua, Chao Hongyang. An Optimized Motion Estimation Algorithm Based on Macroblock Priorities[J]. Journal of Computer Research and Development, 2011, 48(3): 494-500.
    [5]Xia Shihong, Wei Yi, and Wang Zhaoqi. A Survey of Physics-Based Human Motion Simulation[J]. Journal of Computer Research and Development, 2010, 47(8): 1354-1361.
    [6]Zong Dan, Li Chunpeng, Xia Shihong, Wang Zhaoqi. Key-Postures Based Automated Construction of Motion Graph[J]. Journal of Computer Research and Development, 2010, 47(8): 1321-1328.
    [7]Zhang Zhixian, Liu Jianhua, and Ning Ruxin. Research on Motion Simulation Realization Technology of Planar Linkage Based on Virtual Environment[J]. Journal of Computer Research and Development, 2010, 47(6): 979-987.
    [8]Mao Tianlu, Xia Shihong, Zhu Xiaolong, and Wang Zhaoqi. Real-Time Garment Animation Based on Mixed Model[J]. Journal of Computer Research and Development, 2010, 47(1): 8-15.
    [9]Yang Yuedong, Wang Lili, and Hao Aimin. Motion String: A Motion Capture Data Representation for Behavior Segmentation[J]. Journal of Computer Research and Development, 2008, 45(3): 527-534.
    [10]Zhao Guoying, Li Zhenbo, Deng Yu, Li Hua. Human Motion Recognition and Simulation Based on Retrieval[J]. Journal of Computer Research and Development, 2006, 43(2): 368-373.

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return