Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (7): 2057-2064.DOI: 10.11772/j.issn.1001-9081.2022091365
Special Issue: 第39届CCF中国数据库学术会议(NDBC 2022)
• The 39th CCF National Database Conference (NDBC 2022) • Previous Articles Next Articles
Shuo HUANG, Yanhui LI(), Jianqiu CAO
Received:
2022-09-12
Revised:
2022-11-15
Accepted:
2022-11-21
Online:
2023-07-20
Published:
2023-07-10
Contact:
Yanhui LI
About author:
HUANG Shuo, born in 1998, M. S. candidate. His research interests include data privacy, differential privacy.Supported by:
通讯作者:
李艳辉
作者简介:
黄硕(1998—),男,河南漯河人,硕士研究生,主要研究方向:数据隐私、差分隐私;基金资助:
CLC Number:
Shuo HUANG, Yanhui LI, Jianqiu CAO. PrivSPM: frequent sequential pattern mining algorithm under local differential privacy[J]. Journal of Computer Applications, 2023, 43(7): 2057-2064.
黄硕, 李艳辉, 曹建秋. 本地化差分隐私下的频繁序列模式挖掘算法PrivSPM[J]. 《计算机应用》唯一官方网站, 2023, 43(7): 2057-2064.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022091365
数据集名称 | Avg( | ||
---|---|---|---|
kosarak | 990 002 | 41 270 | 8.1 |
MSNBC | 989 818 | 17 | 4.7 |
retail | 88 162 | 16 479 | 11.3 |
Tab. 1 Description of three datasets
数据集名称 | Avg( | ||
---|---|---|---|
kosarak | 990 002 | 41 270 | 8.1 |
MSNBC | 989 818 | 17 | 4.7 |
retail | 88 162 | 16 479 | 11.3 |
1 | AGRAWAL R, SRIKANT R. Mining sequential patterns [C]// Proceedings of the 11th International Conference on Data Engineering. Piscataway: IEEE, 1995: 3-14. |
2 | 叶青青, 孟小峰, 朱敏杰, 等. 本地化差分隐私研究综述[J]. 软件学报, 2018, 29 (7): 1981-2005. |
YE Q Q, MENG X F, ZHU M J, et al. Survey on local differential privacy[J]. Journal of Software, 2018, 29 (7): 1981-2005. | |
3 | SWEENEY L. k-Anonymity: a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10 (5): 557-570. 10.1142/s0218488502001648 |
4 | GANTA S R, KASIVISWANATHAN S P, SMITH A. Composition attacks and auxiliary information in data privacy [C]// Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2008: 265-273. 10.1145/1401890.1401926 |
5 | WONG R C W, FU A W C, WANG K, et al. Can the utility of anonymized data be used for privacy breaches?[J]. ACM Transactions on Knowledge Discovery from Data, 2011, 5 (3): No.16. 10.1145/1993077.1993080 |
6 | DWORK C. Differential privacy [C]// Proceedings of the 2006 International Colloquium on Automata, Languages, and Programming, LNCS 4052. Berlin: Springer, 2006: 1-12. |
7 | XIA H H, HUANG W C, XIONG Y, et al. Mining frequent sequential patterns with local differential privacy[J]. International Journal of Network Security, 2021, 23 (5): 817-829. |
8 | WANG T, HU Z. Local differential privacy-based frequent sequence mining[J]. Journal of King Saud University — Computer and Information Sciences, 2022, 34 (6 Pt B): 3591-3601. 10.1016/j.jksuci.2022.04.013 |
9 | SRIKANT R, AGRAWAL R. Mining sequential patterns: generalizations and performance improvements [C]// Proceedings of the 1996 International Conference on Extending Database Technology, LNCS 1057. Berlin: Springer, 1996: 1-17. |
10 | ZAKI M J. SPADE: an efficient algorithm for mining frequent sequences[J]. Machine Learning, 2001, 42 (1/2): 31-60. |
11 | FOURNIER-VIGER P, GOMARIZ A, CAMPOS M, et al. Fast vertical mining of sequential patterns using co-occurrence information [C]// Proceedings of the 2014 Pacific-Asia Conference on Knowledge Discovery and Data Mining, LNCS 8443. Cham: Springer, 2014: 40-52. |
12 | BONOMI L, XIONG L. A two-phase algorithm for mining sequential patterns with differential privacy [C]// Proceedings of the 22nd ACM International Conference on Information and Knowledge Management. New York: ACM, 2013: 269-278. 10.1145/2505515.2505553 |
13 | CHENG X, SU S, XU S, et al. Differentially private maximal frequent sequence mining[J]. Computers and Security, 2015, 55: 175-192. 10.1016/j.cose.2015.08.005 |
14 | XU S Z, CHENG X, SU S, et al. Differentially private frequent sequence mining[J]. IEEE Transactions on Knowledge and Data Engineering, 2016, 28 (11): 2910-2926. 10.1109/tkde.2016.2601106 |
15 | 李艳辉, 刘浩, 袁野, 等. 基于差分隐私的频繁序列模式挖掘算法[J]. 计算机应用, 2017, 37 (2): 316-321, 340. 10.11772/j.issn.1001-9081.2017.02.0316 |
LI Y H, LIU H, YUAN Y, et al. Frequent sequence pattern mining with differential privacy[J]. Journal of Computer Applications, 2017, 37 (2): 316-321, 340. 10.11772/j.issn.1001-9081.2017.02.0316 | |
16 | WARNER S L. Randomized response: a survey technique for eliminating evasive answer bias[J]. Journal of the American Statistical Association, 1965, 60 (309): 63-69. 10.1080/01621459.1965.10480775 |
17 | ERLINGSSON Ú, PIHUR V, KOROLOVA A. RAPPOR: randomized aggregatable privacy-preserving ordinal response [C]// Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2014: 1054-1067. 10.1145/2660267.2660348 |
18 | BASSILY R, SMITH A. Local, private, efficient protocols for succinct histograms [C]// Proceedings of the 47th Annual ACM Symposium on Theory of Computing. New York: ACM, 2015: 127-135. 10.1145/2746539.2746632 |
19 | WANG T H, BLOCKI J, LI N H, et al. Locally differentially private protocols for frequency estimation [C]// Proceedings of the 26th USENIX Security Symposium. Berkeley: USENIX Association, 2017: 729-745. |
20 | WANG T H, LI N H, JHA S. Locally differentially private heavy hitter identification[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18 (2): 982-993. 10.1109/tdsc.2019.2927695 |
21 | ZHAO D, ZHAO S Y, CHEN H, et al. Efficient protocols for heavy hitter identification with local differential privacy[J]. Frontiers of Computer Science, 2022, 16 (5): No.165825. 10.1007/s11704-021-0412-y |
22 | YE Q Q, HU H B, MENG X F, et al. PrivKV: key-value data collection with local differential privacy [C]// Proceedings of the 2019 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2019: 317-331. 10.1109/sp.2019.00018 |
23 | NGUYÊN T T, XIAO X K, YANG Y, et al. Collecting and analyzing data from smart device users with local differential privacy[EB/OL]. (2016-06-16) [2021-09-27]. . |
24 | GU X L, LI M, CHENG Y Q, et al. PCKV: locally differentially private correlated key-value data collection with optimized utility [C]// Proceedings of the 29th USENIX Security Symposium. Berkeley: USENIX Association, 2020: 967-984. |
25 | QIN Z, YANG Y, YU T, et al. Heavy hitter estimation over set-valued data with local differential privacy [C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016: 192-203. 10.1145/2976749.2978409 |
26 | WANG S W, HUANG L S, NIE Y W, et al. PrivSet: set-valued data analyses with locale differential privacy [C]// Proceedings of the 2018 IEEE Conference on Computer Communications. Piscataway: IEEE, 2018: 1088-1096. 10.1109/infocom.2018.8486234 |
27 | WANG S W, QIAN Y Q, DU J C, et al. Set-valued data publication with local privacy: tight error bounds and efficient mechanisms[J]. Proceedings of the VLDB Endowment, 2020, 13 (8): 1234-1247. 10.14778/3389133.3389140 |
28 | WANG T H, LI N H, JHA S. Locally differentially private frequent itemset mining [C]// Proceedings of the 2018 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2018: 127-143. 10.1109/sp.2018.00035 |
29 | AFROSE S, HASHEM T, ALI M E. Frequent itemsets mining with a guaranteed local differential privacy in small datasets [C]// Proceedings of the 33rd International Conference on Scientific and Statistical Database Management. New York: ACM, 2021: 232-236. 10.1145/3468791.3468807 |
30 | LIU H J, CUI L W, MA X B, et al. Frequent itemset mining of user's multi-attribute under local differential privacy[J]. Computers, Materials & Continua, 2020, 65 (1): 369-385. 10.32604/cmc.2020.010987 |
31 | LI N H, QARDAJI W, SU D. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy [C]// Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2012: 32-33. 10.1145/2414456.2414474 |
32 | WANG N, XIAO X, YANG Y, et al. PrivSuper: a superset-first approach to frequent itemset mining under differential privacy[C]// Proceedings of the 2017 IEEE 33rd International Conference on Data Engineering. Piscataway: IEEE, 2017: 809-820. 10.1109/icde.2017.131 |
[1] | Huanhuan LI, Tianqiang HUANG, Xuemei DING, Haifeng LUO, Liqing HUANG. Public traffic demand prediction based on multi-scale spatial-temporal graph convolutional network [J]. Journal of Computer Applications, 2024, 44(7): 2065-2072. |
[2] | Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG. Review on security threats and defense measures in federated learning [J]. Journal of Computer Applications, 2024, 44(6): 1663-1672. |
[3] | Yao DONG, Yixue FU, Yongfeng DONG, Jin SHI, Chen CHEN. Survey of incomplete multi-view clustering [J]. Journal of Computer Applications, 2024, 44(6): 1673-1682. |
[4] | Peiqian LIU, Shuilian WANG, Zihao SHEN, Hui WANG. Location privacy protection algorithm based on trajectory perturbation and road network matching [J]. Journal of Computer Applications, 2024, 44(5): 1546-1554. |
[5] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[6] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[7] | Keshuai YANG, Youxi WU, Meng GENG, Jingyu LIU, Yan LI. Top-k high average utility sequential pattern mining algorithm under one-off condition [J]. Journal of Computer Applications, 2024, 44(2): 477-484. |
[8] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. |
[9] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[10] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. |
[11] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
[12] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. Dynamic social network privacy publishing method for partial graph updating [J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. |
[13] | Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG. Progress and prospect of zero-knowledge proof enabling blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3669-3677. |
[14] | Xuebin CHEN, Changsheng QU. Overview of backdoor attacks and defense in federated learning [J]. Journal of Computer Applications, 2024, 44(11): 3459-3469. |
[15] | Hui ZHOU, Yuling CHEN, Xuewei WANG, Yangwen ZHANG, Jianjiang HE. Deep shadow defense scheme of federated learning based on generative adversarial network [J]. Journal of Computer Applications, 2024, 44(1): 223-232. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||