2019
DOI: 10.1109/access.2019.2939891
|View full text |Cite
|
Sign up to set email alerts
|

DPRF: A Differential Privacy Protection Random Forest

Abstract: Providing privacy protection for classification algorithms has become a research hotspot in current data mining. In this paper, differential privacy is applied to the random forest classification algorithm, and a random forest algorithm based on differential privacy is proposed to protect the privacy information in the data classification process. Firstly, differential privacy provides privacy protection by adding perturbation noise, which leads to a decrease in the classification accuracy of random forest alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1
1

Relationship

3
6

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 32 publications
(31 reference statements)
0
16
0
Order By: Relevance
“…Besides, we can see the number of test cases generated by AFL-fuzzer grows steadily as the number of samples increases, because Afl-fuzzer prunes input samples in consideration of that users may offer low-quality initial samples and thus cause the possible data redundancy in some types of variations. Although depending more on the number of samples, the method proposed adopts a more pertinent generation strategy [35][36][37][38][39][40][41][42][43][44][45][46][47].…”
Section: Methods and Experimentalmentioning
confidence: 99%
“…Besides, we can see the number of test cases generated by AFL-fuzzer grows steadily as the number of samples increases, because Afl-fuzzer prunes input samples in consideration of that users may offer low-quality initial samples and thus cause the possible data redundancy in some types of variations. Although depending more on the number of samples, the method proposed adopts a more pertinent generation strategy [35][36][37][38][39][40][41][42][43][44][45][46][47].…”
Section: Methods and Experimentalmentioning
confidence: 99%
“…At the same 4 Complexity time, in the particular network environment with obvious resource constraints such as WSN network and mobile Adhoc network, the game theory is also applied to the solution of the optimal intrusion detection strategy [29][30][31][32][33][34]. Research on mimetic honeypot intrusion detection technology based on game theory is also often involved [35,36]. In general, game theory has been widely used in the field of network attack and defence and can be used to solve the optimal strategy of network attack and defence.…”
Section: Related Researchmentioning
confidence: 99%
“…However, as the edge computing network is a hybrid network architecture that involves multiple links and multiple technologies, a unified international standard has not yet been formed. e security protection technologies for edge computing networks have also experienced password protection, security models, access control policies, host hardening to anomaly detection, and association analysis [30][31][32][33][34][35][36][37][38]. However, the above technologies are mainly based on passive defence.…”
Section: Introductionmentioning
confidence: 99%
“…If rand < p (20) Foraging behavior: update the position X i of birds using equation 8; 21Else (22) Vigilance behavior: update the position X i of birds using equation 2; 23End If (24) End For (25) Else (26) Flight behavior is divided into producers and scroungers; (27) For…”
Section: N);mentioning
confidence: 99%