2018 IEEE International Conference on Data Mining Workshops (ICDMW) 2018
DOI: 10.1109/icdmw.2018.00208
|View full text |Cite
|
Sign up to set email alerts
|

PPSF: An Open-Source Privacy-Preserving and Security Mining Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…Recently, many sophisticated tools in the form of open source libraries, frameworks, and prototypes have been developed for data anonymity (DA), privacy preserving data mining (PPDM), and privacy preserving utility mining (PPUM). Lin et al [57] presented a unified privacy preserving and security framework (PPSF) for the DA, PPDP, and PPUM. The developed framework provides thirteen algorithms' implementation.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Recently, many sophisticated tools in the form of open source libraries, frameworks, and prototypes have been developed for data anonymity (DA), privacy preserving data mining (PPDM), and privacy preserving utility mining (PPUM). Lin et al [57] presented a unified privacy preserving and security framework (PPSF) for the DA, PPDP, and PPUM. The developed framework provides thirteen algorithms' implementation.…”
Section: Background and Related Workmentioning
confidence: 99%
“…They also realized the phishing of data over the Internet, which arises because data can contain some confidential information. In addition, recent advancements in the field of learning technology have significantly threatened individuals' privacy [9], [15]. Large investments have also been committed to issues on privacy protection, such as privacy preserving data publishing (PPDP) [16] and privacy aware learning [17].…”
Section: Ppdmmentioning
confidence: 99%
“…The practice of extracting patterns (i.e., knowledge) from big data sets is conducted to generate new or useful information, which can be used to represent, interpret, or discover interesting patterns. This practice is referred to as data mining, which is an interdisciplinary subfield of computer science [5]- [9]. The term ''data mining'' has been considered a substitute explanatory term for ''knowledge discovery from data'' (KDD), which is another term that denotes the goal of data mining.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, it is proved that the proposed scheme improves performance on latency from the viewpoints of mobility and security compared to the existing vertical model. mobile IoT devices connected to private networks in the smart city on the condition that a smart mobility management is provided [10][11][12].In recent decades, preserving privacy and ensuring the security of data have emerged as important issues as confidential information or private data may be revealed by powerful data mining tools [13][14][15]. Therefore, if hackers attack a smart city with lots of IoT devices, the outcome could be far more catastrophic.…”
mentioning
confidence: 99%
“…In recent decades, preserving privacy and ensuring the security of data have emerged as important issues as confidential information or private data may be revealed by powerful data mining tools [13][14][15]. Therefore, if hackers attack a smart city with lots of IoT devices, the outcome could be far more catastrophic.…”
mentioning
confidence: 99%