Protection or Privacy? Data Mining and Personal Data
نویسنده
چکیده
A multiclass classification method based on output design p. 15 Regularized semi-supervised classification on manifold p. 20 Similarity-based sparse feature extraction using local manifold learning p. 30 Generalized conditional entropy and a metric splitting criterion for decision trees p. 35 RNBL-MN : a recursive naive Bayes learner for sequence classification p. 45 TRIPPER : rule learning using taxonomies p. 55 Using weighted nearest neighbor to benefit from unlabeled data p. 60 Constructive meta-level feature selection method based on method repositories p. 70 Variable randomness in decision tree ensembles p. 81 Further improving emerging pattern based classifiers via bagging p. 91 Improving on bagging with input smearing p. 97 Boosting prediction accuracy on imbalanced datasets with SVM ensembles p. 107 DeLiClu : boosting robustness, completeness, usability, and efficiency of hierarchical clustering by a closest pair ranking p. 119 Iterative clustering analysis for grouping missing data in gene expression profiles p. 129 An EM-approach for clustering multi-instance objects p. 139 Mining maximal correlated member clusters in high dimensional database p. 149 Hierarchical clustering based on mathematical optimization p. 160 Clustering multi-represented objects using combination trees p. 174 Parallel density-based clustering of complex objects p. 179 Neighborhood density method for selecting initial cluster centers in K-means clustering p. 189 Uncertain data mining : an example in clustering location data p. 199 Parallel randomized support vector machine p. 205 [epsilon]-tube based pattern selection for support vector machines p. 215 Self-adaptive two-phase support vector clustering for multi-relational data mining p. 225 One-class support vector machines for recommendation tasks p. 230 Heterogeneous information integration in hierarchical text classification p. 240 FISA : feature-based instance selection for imbalanced text classification p. 250 Dynamic category profiling for text filtering and classification p. 255 Detecting citation types using finite-state machines p. 265 A systematic study of parameter correlations in large scale duplicate document detection p. 275 Comparison of documents classification techniques to classify medical reports p. 285 XCLS : a fast and effective clustering algorithm for heterogenous XML documents p. 292 Clustering large collection of biomedical literature based on ontology-enriched bipartite graph representation and mutual refinement strategy p. 303 Level-biased statistics in the hierarchical structure of the Web p. 313
منابع مشابه
A Sudy on Information Privacy Issue on Social Networks
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...
متن کاملAnalysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks
Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...
متن کاملPrivacy in Cyberspace
Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...
متن کاملDe-identification for privacy protection in multimedia content: A survey
Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio–video surveillance. Each of these can potentially provide the means for privacy in...
متن کاملPrivacy by Design in Data Mining
Privacy is ever-growing concern in our society: the lack of reliable privacy safeguards in many current services and devices is the basis of a diffusion that is often more limited than expected. Moreover, people feel reluctant to provide true personal data, unless it is absolutely necessary. Thus, privacy is becoming a fundamental aspect to take into account when one wants to use, publish and a...
متن کاملk -Anonymous Data Mining: A Survey
Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming a crucial issue that has captured the atte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006