2014
DOI: 10.14569/ijacsa.2014.051126
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of the Effects of K-Anonymity on Machine Learning Algorithms

Abstract: Abstract-While research has been conducted in machine learning algorithms and in privacy preserving in data mining (PPDM), a gap in the literature exists which combines the aforementioned areas to determine how PPDM affects common machine learning algorithms. The aim of this research is to narrow this literature gap by investigating how a common PPDM algorithm, K-Anonymity, affects common machine learning and data mining algorithms, namely neural networks, logistic regression, decision trees, and Bayesian clas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 42 publications
0
6
0
Order By: Relevance
“…Privacy-breaching ransomware is characterized by its focus on data theft, distinguishing it from traditional ransomware that primarily seeks to encrypt data for ransom. The literature reveals that this variant poses a more insidious threat, as it not only disrupts operations but also compromises data confidentiality [12]- [16]. Such ransomware typically employs techniques to identify and exfiltrate data of value, often targeting specific file types or databases containing sensitive personal or corporate information [1], [17], [18].…”
Section: A Privacy-breaching Ransomwarementioning
confidence: 99%
“…Privacy-breaching ransomware is characterized by its focus on data theft, distinguishing it from traditional ransomware that primarily seeks to encrypt data for ransom. The literature reveals that this variant poses a more insidious threat, as it not only disrupts operations but also compromises data confidentiality [12]- [16]. Such ransomware typically employs techniques to identify and exfiltrate data of value, often targeting specific file types or databases containing sensitive personal or corporate information [1], [17], [18].…”
Section: A Privacy-breaching Ransomwarementioning
confidence: 99%
“…The results show that the proposed algorithm achieves a classification accuracy comparable with the benchmark model. Some other work has used standard k-anonymity based privacy models in order to anonymize the training data (Rodríguez-Hoyos et al, 2018), (Herranz et al, 2010), (Wimmer and Powell, 2014). Despite the data distortion the models induced from anonymized data has reported comparable accuracies with the benchmark model.…”
Section: Related Workmentioning
confidence: 99%
“…CHAID algorithm uses Pearson's Chi-square when a target variable is categorical and uses likelihood ratio Chi-square statistic as a separation reference when a target variable is continuous [14]. Chi-square is calculated from the r × c partition …”
Section: B Chi-squared Automatic Interaction Detectionmentioning
confidence: 99%