• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hong Jinxin, Wu Yingjie, Cai Jianping, Sun Lan. Differentially Private High-Dimensional Binary Data Publication via Attribute Segmentation[J]. Journal of Computer Research and Development, 2022, 59(1): 182-196. DOI: 10.7544/issn1000-1239.20200701
Citation: Hong Jinxin, Wu Yingjie, Cai Jianping, Sun Lan. Differentially Private High-Dimensional Binary Data Publication via Attribute Segmentation[J]. Journal of Computer Research and Development, 2022, 59(1): 182-196. DOI: 10.7544/issn1000-1239.20200701

Differentially Private High-Dimensional Binary Data Publication via Attribute Segmentation

Funds: This work was supported by the Natural Science Foundation of Fujian Province of China (2017J01754, 2018J01797).
More Information
  • Published Date: December 31, 2021
  • Generally, as the attribute dimension of the data set increases, the time cost and noise interference generated by the differential privacy publishing method of high-dimensional data will also increase. Especially for high-dimensional binary data, it is easy to be covered by excessive noise. Therefore, an efficient and low-noise publishing method PrivSCBN(differentially private spectral clustering Bayesian network) is proposed for the issue of privacy publishing of high-dimensional binary data. Firstly, based on Jaccard distance, this method uses a spectral clustering algorithm which satisfies differential privacy to divide the attributes set, and further segments the original data set, so as to achieve dimension reduction. Secondly, based on the idea of dynamic programming and combined with the exponential mechanism, this method uses a fast building Bayesian network algorithm which satisfies differential privacy to construct Bayesian network for each subset after segmentation. Finally, this method uses the value characteristic of conditional probability on binary data to add noise to conditional distribution extracted from Bayesian network, and reduces the noise by controlling the maximum in-degrees of Bayesian network. The efficiency and availability of the PrivSCBN method are verified by experiments on three real high-dimensional binary data sets.
  • Related Articles

    [1]Chen Kejia, Lu Hao, Zhang Jiajun. Conditional Variational Time-Series Graph Auto-Encoder[J]. Journal of Computer Research and Development, 2020, 57(8): 1663-1673. DOI: 10.7544/issn1000-1239.2020.20200202
    [2]Geng Pu, Zhu Yuefei. A Code Encrypt Technique Based on Branch Condition Obfuscation[J]. Journal of Computer Research and Development, 2019, 56(10): 2183-2192. DOI: 10.7544/issn1000-1239.2019.20190368
    [3]Zhou Yanhong, Zhang Xianyong, Mo Zhiwen. Conditional Neighborhood Entropy with Granulation Monotonicity and Its Relevant Attribute Reduction[J]. Journal of Computer Research and Development, 2018, 55(11): 2395-2405. DOI: 10.7544/issn1000-1239.2018.20170607
    [4]Guo Xi, Wang Pan. Variable Dependent Relation Analysis in Program State Condition Merging[J]. Journal of Computer Research and Development, 2018, 55(10): 2331-2342. DOI: 10.7544/issn1000-1239.2018.20170545
    [5]Wen Wanzhi, Li Bixin, Sun Xiaobing, Qi Shanshan. A Technique of Multiple Fault Localization Based on Conditioned Execution Slicing Spectrum[J]. Journal of Computer Research and Development, 2013, 50(5): 1030-1043.
    [6]Dong Yongquan, Li Qingzhong, Ding Yanhui, Peng Zhaohui. Constrained Conditional Random Fields for Semantic Annotation of Web Data[J]. Journal of Computer Research and Development, 2012, 49(2): 361-371.
    [7]He Xin, Gui Xiaolin, An Jian. A Distributed Area Coverage Algorithm Based on Delayed Awakening in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2011, 48(5): 786-792.
    [8]Xia Yimin, Luo Jun, and Zhang Minxuan. Detecting Out-of-Bounds Accesses with Conditional Range Constraint[J]. Journal of Computer Research and Development, 2006, 43(10): 1760-1766.
    [9]Jiang Yuncheng, Shi Zhongzhi, Tang Yong, Wang Ju. A Distributed Dynamic Description Logic[J]. Journal of Computer Research and Development, 2006, 43(9): 1603-1608.
    [10]Xiong Zhongmin, Hao Zhongxiao. An Approach to Termination Decision for a Rule Set Based on Activation Path and Conditional Formula[J]. Journal of Computer Research and Development, 2006, 43(5): 901-907.
  • Cited by

    Periodical cited type(5)

    1. 蒋志荣,李亚男. 跨层安全访问多模态异构网络数据的数学建模. 计算机仿真. 2024(04): 475-479 .
    2. 褚治广,李俊燕,陈昊,张兴. 基于分布式多关联属性的高维数据差分隐私保护方法. 计算机工程与设计. 2024(04): 967-973 .
    3. 卢晓天,朴春慧,杨兴雨,白英杰. 基于贝叶斯网络的差分隐私高维数据发布技术研究. 计算机工程. 2024(05): 167-181 .
    4. 梁丹凝,梁坚. 基于Relief算法的不平衡数据分类分级算法仿真. 计算机仿真. 2024(06): 477-480+497 .
    5. 张小玉,沈国华,杨阳. 基于属性分割的差分隐私异构多属性数据发布. 计算机系统应用. 2022(10): 225-235 .

    Other cited types(12)

Catalog

    Article views (337) PDF downloads (148) Cited by(17)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return