2018
DOI: 10.18034/abcjar.v7i2.654
|View full text |Cite
|
Sign up to set email alerts
|

Data Privacy-Preservation: A Method of Machine Learning

Abstract: The privacy-preservation field in cyber security tends to affiliate with the protection measure related to the use of data and its sharing via third parties for activities such as data analysis. The paper's main objective for this research article will be to use machine learning models that tend to aid as a privacy-preservation technique (PPT). The augmentation of machine learning as a technique for privacy preservation has been able to address the challenges facing the current field of cyber security concerni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Before a company can successfully leverage information, there needs to be a distinction between information (Achar, 2018a). As such, essential information needs to be made clear.…”
Section: Review Of Related Literaturementioning
confidence: 99%
“…Before a company can successfully leverage information, there needs to be a distinction between information (Achar, 2018a). As such, essential information needs to be made clear.…”
Section: Review Of Related Literaturementioning
confidence: 99%
“…Hochreiter and Schmidhuber proposed LSTMs as a form of recurrent neural network (RNN) (1997). Memory cells in LSTMs are equivalent to states in traditional dynamical systems models, making them helpful for mimicking real systems such as watersheds (Achar, 2018a). LSTMs avoid exploding and/or vanishing gradients, which allows them to learn long-term dependencies between input and output features, unlike other forms of recurrent neural networks.…”
Section: Overview Of Lstm Networkmentioning
confidence: 99%
“…Research is conducted on the dimensionless pressure derivatives of a vertical oil well to find the best possible site for the well that will allow for good oil production while minimizing the impact of any external boundaries that may come into play too soon. Achar (2018a) examined the typical workflow that governs probabilistic evaluation methodologies and proposed a Python script-based approach. This approach enables the user to run a quick and easy mineral components evaluation based on porosity and raw input logs.…”
Section: Introductionmentioning
confidence: 99%