2021
DOI: 10.1002/ett.4209
|View full text |Cite
|
Sign up to set email alerts
|

An evolutionary computation‐based privacy‐preserving data mining model under a multithreshold constraint

Abstract: Privacy-preserving data mining (PPDM) is a popular research topic in the data mining field. For individual information protection, it is vital to protect sensitive information during data mining procedures. Furthermore, it is also a serious offense to spill sensitive private knowledge. Recently, many PPDM data mining algorithms have been proposed to conceal sensitive items in a given database to disclose high-frequency items. These recent methods have already proven to be excellent in protecting confidential i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…To preserve privacy and facilitate discovery, researchers have recently turned to a deep reinforcement learning approach for database sanitization [34][35][36]. The interested reader is directed to the recent studies in [37][38][39][40][41] for more reading in this area.…”
Section: Related Workmentioning
confidence: 99%
“…To preserve privacy and facilitate discovery, researchers have recently turned to a deep reinforcement learning approach for database sanitization [34][35][36]. The interested reader is directed to the recent studies in [37][38][39][40][41] for more reading in this area.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, a deep reinforcement learning technique has been applied to sanitize sensitive data from a database while still protecting privacy and allowing for knowledge discovery [33] [34]. For more information in this area, the reader can refer to the recent research in [35][36][37][38][39].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, the Internet of Things (IoT) systems have been excessively deployed in our daily life activities. [1][2][3][4] This, as a result, introduces several practical challenges to deal with the massive number of connected devices, including the limited licensed bandwidth resources. 5 In specific, the available licensed bandwidth cannot support the expected massive connectivity, especially when considering the IoT sensors systems.…”
Section: Introductionmentioning
confidence: 99%