• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ge Weiping, Wang Wei, Zhou Haofeng, and Shi Baile. Privacy Preserving Classification Mining[J]. Journal of Computer Research and Development, 2006, 43(1): 39-45.
Citation: Ge Weiping, Wang Wei, Zhou Haofeng, and Shi Baile. Privacy Preserving Classification Mining[J]. Journal of Computer Research and Development, 2006, 43(1): 39-45.

Privacy Preserving Classification Mining

More Information
  • Published Date: January 14, 2006
  • Privacy preserving classification mining is one of the fast-growing sub-areas of data mining. How to perturb original data and then build a decision tree based on perturbed data is the key research challenge. By applying transition probability matrix a novel privacy preserving classification mining algorithm is proposed, which suits non-char type data (Boolean, categorical, and numeric type) and non-uniform probability distribution of original data, and can perturb label attribute. Experimental results demonstrate that the decision tree built using this algorithm on perturbed data has a classifying accuracy comparable to that of the decision tree built using un-privacy-preserving algorithm on original data.
  • Related Articles

    [1]Wang Xianghai, Zhang Wenya, Xing Junyu, Lü Fang, Mu Zhenhua. High-order Caputo Fractional Order Differential Operator and Its Application in Image Enhancement[J]. Journal of Computer Research and Development, 2023, 60(2): 448-464. DOI: 10.7544/issn1000-1239.202110942
    [2]Liu Yanxiao, Wu Ping, Sun Qindong. Secret Image Sharing Schemes Based on Region Convolution Neural Network[J]. Journal of Computer Research and Development, 2021, 58(5): 1065-1074. DOI: 10.7544/issn1000-1239.2021.20200898
    [3]Ren Weixiang, Zhai Liming, Wang Lina, Jia Ju. Reference Image Generation Algorithm for JPEG Image Steganalysis Based on Convolutional Neural Network[J]. Journal of Computer Research and Development, 2019, 56(10): 2250-2261. DOI: 10.7544/issn1000-1239.2019.20190386
    [4]Wang Yilei, Zhuo Yifan, Wu Yingjie, Chen Mingqin. Question Answering Algorithm on Image Fragmentation Information Based on Deep Neural Network[J]. Journal of Computer Research and Development, 2018, 55(12): 2600-2610. DOI: 10.7544/issn1000-1239.2018.20180606
    [5]Zhou Yucong, Liu Yi, Wang Rui. Training Deep Neural Networks for Image Applications with Noisy Labels by Complementary Learning[J]. Journal of Computer Research and Development, 2017, 54(12): 2649-2659. DOI: 10.7544/issn1000-1239.2017.20170637
    [6]Shen Huanghui, Wang Zhensong, Zheng Weimin. An Efficient Memory Access Strategy for Transposition and Block Operation in Image Processing[J]. Journal of Computer Research and Development, 2013, 50(1): 188-196.
    [7]Ye Jianhong, Song Wen, Sun Shixin. Operating and Analyzing the Reproducibility of Empty Marking Nets[J]. Journal of Computer Research and Development, 2009, 46(8): 1378-1385.
    [8]Bai Chenggang, Su Liang, Zhao Yingchun, Guo Junhong, and Cai Kaiyuan. Is the Reliability of Web Services Related to the Change Rate of Operational Profiles[J]. Journal of Computer Research and Development, 2008, 45(12): 2044-2051.
    [9]Zheng Qingfang, Gao Wen. Adaptive Skin Detection in JPEG Compressed Images[J]. Journal of Computer Research and Development, 2006, 43(7): 1194-1200.
    [10]Bao Fumin, Li Aiguo, Qin Zheng. Image Fusion Using SGNN[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (796) PDF downloads (2562) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return