2022
DOI: 10.1155/2022/1598826
|View full text |Cite|
|
Sign up to set email alerts
|

Privacy Protection Technology Based on Machine Learning and Intelligent Data Recognition

Abstract: The machine learning algorithm is gradually being applied to various fields and has become the core technology to achieve artificial intelligence. The success of machine learning cannot be achieved without the support of large amounts of data and computing power, which are usually collected through crowdsourcing and learned online. The data collected for machine learning training often contains some personal and sensitive information, including personal mobile phone numbers, ID numbers, and medical information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Traditionally, convolutions are employed in image analysis to blur as well as sharpen pictures, but they can also be used for other tasks. CNNs impose a connection oriented pattern among neurons of adjacent layers (for instance, by embossing and enhancing edges) [20].The 2D convolution layer, which is frequently referred to by the acronym conv2D, is the most widely used type of convolution. In a conv2D layer, an elementwise multiplication is carried out by a filter or kernel as it "slides" over the 2D input data.…”
Section: D Convolutional Neural Networkmentioning
confidence: 99%
“…Traditionally, convolutions are employed in image analysis to blur as well as sharpen pictures, but they can also be used for other tasks. CNNs impose a connection oriented pattern among neurons of adjacent layers (for instance, by embossing and enhancing edges) [20].The 2D convolution layer, which is frequently referred to by the acronym conv2D, is the most widely used type of convolution. In a conv2D layer, an elementwise multiplication is carried out by a filter or kernel as it "slides" over the 2D input data.…”
Section: D Convolutional Neural Networkmentioning
confidence: 99%
“…Encryption, access limits, and anonymization methods are just some of the security measures that schools should put in place to secure students' personal information. The Family Educational Rights and Privacy Act (FERPA) in the United States regulate the use and disclosure of student data, and shall be followed [8][9][10][11][12].…”
Section: Machine Learning In Data Privacymentioning
confidence: 99%
“…Finally, the gradient value from the stochastic gradient descent technique is used to adjust the level of the Gaussian noise and protect the sensitive data. The experimental findings showed that a middle ground could be found between the availability and privacy protection of the training data set by modifying the parameters of the depth differential privacy model based on variations in private information in the data [10]. 2023) predicted student retention using app-based engagement metrics and socio-demographic factors with machine learning.…”
Section: B Holicza Et Al (mentioning
confidence: 99%
“…Smart home privacy no longer stays in traditional privacy information such as name, ID number, bank card number, password, and family address. Interests, habits, behavior, and other information are becoming more and more common [43]. Once this data is abused or spread, it brings excellent instability to the society and even affects the country's security.…”
Section: Privacy Awarenessmentioning
confidence: 99%