Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review

U Hewage, R Sinha, MA Naeem - Artificial Intelligence Review, 2023 - Springer
This study investigates existing input privacy-preserving data mining (PPDM) methods and
privacy-preserving data stream mining methods (PPDSM), including their strengths and …

Privacy-preserving brain–computer interfaces: A systematic review

K **a, W Duch, Y Sun, K Xu, W Fang… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
A brain–computer interface (BCI) establishes a direct communication pathway between the
human brain and a computer. It has been widely used in medical diagnosis, rehabilitation …

Cybersecurity in neural interfaces: Survey and future trends

X Jiang, J Fan, Z Zhu, Z Wang, Y Guo, X Liu… - Computers in Biology …, 2023 - Elsevier
With the joint advancement in areas such as pervasive neural data sensing, neural
computing, neuromodulation and artificial intelligence, neural interface has become a …

Federated learning system without model sharing through integration of dimensional reduced data representations

A Bogdanova, A Nakai, Y Okada, A Imakura… - arxiv preprint arxiv …, 2020 - arxiv.org
Dimensionality Reduction is a commonly used element in a machine learning pipeline that
helps to extract important features from high-dimensional data. In this work, we explore an …

Accuracy and privacy evaluations of collaborative data analysis

A Imakura, A Bogdanova, T Yamazoe, K Omote… - arxiv preprint arxiv …, 2021 - arxiv.org
Distributed data analysis without revealing the individual data has recently attracted
significant attention in several applications. A collaborative data analysis through sharing …

SMAP: A joint dimensionality reduction scheme for secure multi-party visualization

J **a, T Chen, L Zhang, W Chen, Y Chen… - … IEEE Conference on …, 2020 - ieeexplore.ieee.org
Nowadays, as data becomes increasingly complex and distributed, data analyses often
involve several related datasets that are stored on different servers and probably owned by …

Efficient and secure kNN classification over encrypted data using vector homomorphic encryption

H Yang, W He, J Li, H Li - 2018 IEEE International Conference …, 2018 - ieeexplore.ieee.org
The k-nearest neighbor (kNN) classification has been widely adopted in data mining
applications. In the age of big data, kNN classification process has to be outsourced to the …

A Novel Hybrid Approach of Suppression and Randomization for Privacy Preserving Data Mining.

V Sharma, D Soni, D Srivastava, P Kumar - Ilkogretim Online, 2021 - search.ebscohost.com
In the era of technology advancement, knowledge extraction from large amount of data is
very much important task. The process of data mining is applied to get the useful information …

A comprehensive assessment of privacy preserving data mining techniques

KN Prasanthi, MVP Chandra Sekhara Rao - Proceedings of Second …, 2022 - Springer
The process of knowledge extraction from large datasets is the primary task in Data Mining.
Data warehouse is one of the central repositories of data. When data is available only at a …

Nonmetric multidimensional scaling: A perturbation model for privacy‐preserving data clustering

K Alotaibi, V Rayward‐Smith… - Statistical Analysis and …, 2014 - Wiley Online Library
Data perturbation aims to disguise original data values so the confidential information is kept
safe and the disclosure risk is minimized. In this article, we exploit the characteristics of …