Privacy Preserving Data Mining Using Non-Negative Matrix Factorization and Singular Value Decomposition

被引:5
|
作者
Afrin, Afsana [1 ]
Paul, Mahit Kumar [1 ]
Sattar, A. H. M. Sarowar [1 ]
机构
[1] Rajshahi Univ Engn & Technol, Dept Comp Sci & Engn, Rajshahi, Bangladesh
关键词
Privacy; Data mining; Privacy Preserving data mining; Non-Negative Matrix factorization; Singular Value Decomposition;
D O I
10.1109/eict48899.2019.9068846
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing technologies, people share information time to time from different places. The rapid growing improved technologies and improved data mining algorithms make it easy for adversary to disclose sensitive information. So there is always a second thought while individuals share their personal information. That's why privacy protection is an important consideration at every stage of data mining process. Privacy Preserving Data Mining (PPDM) maintains data utility and protects privacy at the same time. In this paper, real world datasets are perturbed by using combined Non-Negative Matrix Factorization (NMF) and Singular Value Decomposition (SVD) method. The utility of perturbed datasets is analyzed with respect to query accuracy. The result of query accuracy implies that the combined method needs to be improved or more efficient methods need to be introduced.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Structure preserving non-negative matrix factorization for dimensionality reduction
    Li, Zechao
    Liu, Jing
    Lu, Hanqing
    COMPUTER VISION AND IMAGE UNDERSTANDING, 2013, 117 (09) : 1175 - 1189
  • [22] Traffic Risk Mining Using Partially Ordered Non-negative Matrix Factorization
    Lee, Taito
    Matsushima, Shin
    Yamanishi, Kenji
    PROCEEDINGS OF 3RD IEEE/ACM INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS, (DSAA 2016), 2016, : 622 - 631
  • [23] Blind decomposition of mixed pixels using constrained non-negative matrix factorization
    Wang, B
    Zhou, H
    Zhang, LM
    IGARSS 2005: IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, VOLS 1-8, PROCEEDINGS, 2005, : 3757 - 3760
  • [24] Non-negative matrix for mining typical user profiles factorization
    Lu, JJ
    Xu, BW
    Chu, WC
    Yang, HJ
    IKE'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE ENGINEERING, VOLS 1 AND 2, 2003, : 539 - 543
  • [25] Unmixing Hyperspectral Skin Data using Non-Negative Matrix Factorization
    Mehmood, Asif
    Clark, Jeffrey
    Sakla, Wesam
    ACTIVE AND PASSIVE SIGNATURES IV, 2013, 8734
  • [26] Non-negative matrix Factorization for Toxicogenomic Literature Data
    Kang, Byeong-Chul
    Kim, Hyung-Yong
    Lee, Tae-ho
    Shin, Ga-Hee
    Youn, Seok-Joo
    MOLECULAR & CELLULAR TOXICOLOGY, 2009, 5 (03) : 89 - 89
  • [27] A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining
    Keyvanpour, Mohammad Reza
    Moradi, Somayyeh Seifi
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2014, 10 (01) : 55 - 76
  • [28] Mining Association Rules Using Non-Negative Matrix Factorization and Formal Concept Analysis
    Kumar, Aswani Ch
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 31 - 39
  • [29] Human Detection Using Non-negative Matrix Factorization
    Zeng, Jing-Xiu
    Lin, Chih-Yang
    Lin, Wei-Yang
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2015, : 370 - 371
  • [30] Email surveillance using non-negative matrix factorization
    Berry M.W.
    Browne M.
    Computational & Mathematical Organization Theory, 2005, 11 (3): : 249 - 264