A personalized privacy-preserving method for multi-view clustering mining
A technology of cluster mining and privacy protection, applied in the field of information security, can solve problems such as the degree of personalization needs to be improved, privacy security issues not involved in cluster mining, and large information loss
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] For the original data model A=(A 1 ,A 2 ,...,A n ) under a piece of data is expressed as d=(a 1 ,a 2 ,...,a n ), where a i is the attribute of the data, if i exists, (i=1,2,...,n) makes a i If it is sensitive and does not want others to know, then this record d is called a piece of private data, and the quantitative expression of the sensitivity of the data producer to the private data item is called the degree of privacy. Given the original data pattern A=(A 1 ,A 2 ,...,A n ), the corresponding privacy mode is S=(S 1 ,S 2 ,...,S n ), then the privacy data model is defined as sequence pair , and a piece of privacy data under this model is expressed as n recombination d=(d 1 , d 2 ,...,d n ), where d i =i ,s i > is an ordered binary group, a i for attribute A i Corresponding to a raw data value, s i for a i corresponding degree of privacy. another note d j =(a j1 ,a j2 ,...,a jn ) is the original data mode A=(A 1 ,A 2 ,...,A n ) of the jth tup...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com