2022
DOI: 10.4018/jdm.309413
|View full text |Cite
|
Sign up to set email alerts
|

Random Forest Algorithm Based on Linear Privacy Budget Allocation

Abstract: In the era of big data with exponential growth in data volume, how to reduce data security issues such as data leakage caused by machine learning is a hot area of recent research. The existing privacy budget allocation strategies are usually only suitable for data applications in specific spaces and cannot meet users' personalized needs for privacy budget allocation. Therefore, a linear privacy budget allocation strategy is proposed. The strategy assigns each layer a linearly increasing privacy budget from the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 36 publications
(28 reference statements)
0
4
0
Order By: Relevance
“…Calculating the distance between two individuals through encrypted trajectory data is one way to enable contact tracing with privacy protection. Block chain technology implements operations that provide encrypted and anonymous personal identities; hence, Xu et al (2022) created two chains and a public key to handle location data. The control and prevention authority then generated a diagnostic key to determine whether the individual is a close contact (Xu et al, 2022).…”
Section: Contact Tracingmentioning
confidence: 99%
See 2 more Smart Citations
“…Calculating the distance between two individuals through encrypted trajectory data is one way to enable contact tracing with privacy protection. Block chain technology implements operations that provide encrypted and anonymous personal identities; hence, Xu et al (2022) created two chains and a public key to handle location data. The control and prevention authority then generated a diagnostic key to determine whether the individual is a close contact (Xu et al, 2022).…”
Section: Contact Tracingmentioning
confidence: 99%
“…Block chain technology implements operations that provide encrypted and anonymous personal identities; hence, Xu et al (2022) created two chains and a public key to handle location data. The control and prevention authority then generated a diagnostic key to determine whether the individual is a close contact (Xu et al, 2022). To precisely find who is in close contact with a patient, W. Kim's (2020) team proposed a model using the encrypted spatiotemporal trajectory data (W. Kim et al, 2020).…”
Section: Contact Tracingmentioning
confidence: 99%
See 1 more Smart Citation
“…Today, due to the progress of technology in daily life, a variety of data security issues emerge one after another (Dong et al,2022). People begin to pay attention to data security and privacy protection (Turesson et al, 2021), and information security has become increasingly important in daily life (Bollle et al, 2002;Lin et al, 2020).…”
Section: Introductionmentioning
confidence: 99%