{"title":"隐私保护ID3算法的比较","authors":"N. Madathil, F. Dankar","doi":"10.1109/uemcon53757.2021.9666559","DOIUrl":null,"url":null,"abstract":"Many real-life scenarios require the analysis of large amounts of data from multiple sources. Often, the data contain highly sensitive information and may be subject to privacy laws preventing its aggregation and sharing. Privacy-preserving data mining has emerged as a solution to this problem. It enables data scientists to analyze the distributed data without having to place it in a central location and while guaranteeing its privacy. Decision tree classification is a popular and widely studied machine learning technique for which many privacy-preserving versions exist. In this paper, we review recent privacy preserving implementations of the ID3 classification technique in a distributed environment and compare them in terms of efficiency and privacy. We consider cases where data is split horizontally over multiple parties.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Privacy-Preserving ID3 Algorithms: A Comparison\",\"authors\":\"N. Madathil, F. Dankar\",\"doi\":\"10.1109/uemcon53757.2021.9666559\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many real-life scenarios require the analysis of large amounts of data from multiple sources. Often, the data contain highly sensitive information and may be subject to privacy laws preventing its aggregation and sharing. Privacy-preserving data mining has emerged as a solution to this problem. It enables data scientists to analyze the distributed data without having to place it in a central location and while guaranteeing its privacy. Decision tree classification is a popular and widely studied machine learning technique for which many privacy-preserving versions exist. In this paper, we review recent privacy preserving implementations of the ID3 classification technique in a distributed environment and compare them in terms of efficiency and privacy. We consider cases where data is split horizontally over multiple parties.\",\"PeriodicalId\":127072,\"journal\":{\"name\":\"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/uemcon53757.2021.9666559\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/uemcon53757.2021.9666559","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Many real-life scenarios require the analysis of large amounts of data from multiple sources. Often, the data contain highly sensitive information and may be subject to privacy laws preventing its aggregation and sharing. Privacy-preserving data mining has emerged as a solution to this problem. It enables data scientists to analyze the distributed data without having to place it in a central location and while guaranteeing its privacy. Decision tree classification is a popular and widely studied machine learning technique for which many privacy-preserving versions exist. In this paper, we review recent privacy preserving implementations of the ID3 classification technique in a distributed environment and compare them in terms of efficiency and privacy. We consider cases where data is split horizontally over multiple parties.