2013
DOI: 10.1016/j.asoc.2013.03.011
|View full text |Cite
|
Sign up to set email alerts
|

Incremental learning of privacy-preserving Bayesian networks

Abstract: Bayesian Networks (BNs) have received significant attention in various academic and industrial applications, such as modeling knowledge in image processing, engineering, medicine and bio-informatics. Preserving the privacy of sensitive data, owned by different parties, is often a critical issue. However, in many practical applications, BNs must train from data that gradually becomes available at different period of times, on which the traditional batch learning algorithms are not suitable or applicable. In thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 20 publications
(21 reference statements)
0
6
0
1
Order By: Relevance
“…Set the tree parameters C , D , and E to 1 will make the algorithm to be reduce to the K2 algorithm. For this, many researchers cite this algorithm as a generalization of the K2 algorithm [30,31,36]. At the end, a structure of alternative networks results from the set of parent sets and the network parameters, denoted by a combined Bayesian network.…”
Section: Buntine's Solutionmentioning
confidence: 99%
“…Set the tree parameters C , D , and E to 1 will make the algorithm to be reduce to the K2 algorithm. For this, many researchers cite this algorithm as a generalization of the K2 algorithm [30,31,36]. At the end, a structure of alternative networks results from the set of parent sets and the network parameters, denoted by a combined Bayesian network.…”
Section: Buntine's Solutionmentioning
confidence: 99%
“…So far many secure protocols have been developed for data mining and machine learning techniques such as [10][11] for d ci ion tr cl ific tion, [12][13][14] for clustering, [15], [16] for association rule mining, [17][18][19] for Neural Networks, and [20][21] for Bayesian Networks.…”
Section: Related Workmentioning
confidence: 99%
“…Some recent works [4,7,16,20,35,43] that rely on the storage of partial old data have made impressive progress. They are arguably not memory efficient and storing data for the life time involves violate some practical constraints such as copyright or privacy issues, which is common in the domains like bio-informatics [47]. The performance of the existing methods that do not store any past data is yet unsatisfactory.…”
Section: Introductionmentioning
confidence: 99%