2016
DOI: 10.1007/978-3-319-45507-5_17
|View full text |Cite
|
Sign up to set email alerts
|

The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases

Abstract: Part 2: Special Session on Privacy Aware Machine Learning for Health Data Science (PAML 2016)International audienceToday’s increasingly complex information infrastructures represent the basis of any data-driven industries which are rapidly becoming the 21st century’s economic backbone. The sensitivity of those infrastructures to disturbances in their knowledge bases is therefore of crucial interest for companies, organizations, customers and regulating bodies. This holds true with respect to the direct provisi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
23
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 34 publications
(27 citation statements)
references
References 16 publications
3
23
1
Order By: Relevance
“…Mental health app data infrastructure must therefore be constructed in such a way so as to reduce the risk of data becoming identifiable with the user and or necessitating a user request for deletion (Malle et al, 2016). The aim is to reduce the identifiable content of a data piece from the specific to the general (Malle et al, 2016). Personal identifiers (e.g.…”
Section: Privacy and Data Protectionsupporting
confidence: 44%
See 1 more Smart Citation
“…Mental health app data infrastructure must therefore be constructed in such a way so as to reduce the risk of data becoming identifiable with the user and or necessitating a user request for deletion (Malle et al, 2016). The aim is to reduce the identifiable content of a data piece from the specific to the general (Malle et al, 2016). Personal identifiers (e.g.…”
Section: Privacy and Data Protectionsupporting
confidence: 44%
“…Security issues relating to the content, holding and distribution of that data however remain a prime concern of users and health care professionals (Marley and Farooq, 2015;Malle et al, 2016). Data protection regulations also known as 'The right to be forgotten' means customers can have their data deleted on request (Malle et al, 2016).…”
Section: Privacy and Data Protectionsupporting
confidence: 44%
“…Incorporating the social embedding of nodes into our model would make that draw depend on the values of connected nodes in the graph, allowing us to apply efficient sampling methods such as MCMC (Markov Chain Monte Carlo) [81] to the problem. As a result, ML performance on anonymized graphs could be boosted without any personal re-identification attempts; a crucial advantage as more and more countries adopt stringent data privacy and security laws [82].…”
Section: Knowledge Extraction (Ke)mentioning
confidence: 43%
“…Privacy aware machine learning and privacy preserving machine learning is an important issue [98,99], fostered by anonymization concepts, in which a record is released only if it is indistinguishable from k other entities in the data. k-anonymity is highly dependent on spatial locality in order to effectively implement the technique in a statistically robust way and in high dimensions data becomes sparse, hence the concept of spatial locality is not easy to define.…”
Section: Research Track 7 Dap Privacymentioning
confidence: 45%