Journal on Communications ›› 2023, Vol. 44 ›› Issue (2): 198-209.doi: 10.11959/j.issn.1000-436x.2023028
• Correspondences • Previous Articles Next Articles
Shufen ZHANG1,2,3, Yanling DONG1,2,4, Jingcheng XU1,2,4, Haoshi WANG1,2,4
Revised:
2022-12-25
Online:
2023-02-25
Published:
2023-02-01
Supported by:
CLC Number:
Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG. AdaBoost algorithm based on target perturbation[J]. Journal on Communications, 2023, 44(2): 198-209.
[1] | 陈天莹, 陈剑锋 . 大数据环境下的智能数据脱敏系统[J]. 通信技术, 2016,49(7): 915-922. |
CHEN T Y , CHEN J F . Intelligent data masking system for big data productive environment[J]. Communications Technology, 2016,49(7): 915-922. | |
[2] | SWEENEY L . k-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570. |
[3] | GENTRY C , . Fully homomorphic encryption using ideal lattices[C]// Proceedings of the 41st Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009: 169-178. |
[4] | DWORK C , . Differential privacy[C]// Proceedings of the 33rd International Conference on Automata,Languages and Programming (ICALP’06). Berlin:Springer, 2006: 1-12. |
[5] | DWORK C , AGRAWAL M , DU D ,et al. Differential Privacy:a survey of results[C]// International Conference on Theory and Applications of Models of Computation. Berlin:Springer, 2008: 1-19. |
[6] | DWORK C , LEI J . Differential privacy and robust statistics[C]// Proceedings of the 41st Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009: 371-380. |
[7] | DWORK C , MCSHERRY F , NISSIM K ,et al. Calibrating noise to sensitivity in private data analysis[C]// Theory of Cryptography. Berlin:Springer, 2006: 265-284. |
[8] | MCSHERRY F , TALWAR K . Mechanism design via differential privacy[C]// Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 2007: 94-103. |
[9] | DWORK C , ROTH A . The algorithmic foundations of differential privacy[J]. Foundations and Trends in Theoretical Computer Science, 2013,9(3/4): 211-407. |
[10] | JAGANNATHAN G , PILLAIPAKKAMNATT K , WRIGHT R N . A practical differentially private random decision tree classifier[C]// Proceedings of 2009 IEEE International Conference on Data Mining Workshops. Piscataway:IEEE Press, 2009: 114-121. |
[11] | PATIL A , SINGH S . Differential private random forest[C]// Proceedings of 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI). Piscataway:IEEE Press, 2014: 2623-2630. |
[12] | FLETCHER S , ISLAM M Z . A differentially private decision forest[J]. Expert Systems with Applications, 2017,78: 16-31. |
[13] | 穆海蓉, 丁丽萍, 宋宇宁 ,等. DiffPRFs:一种面向随机森林的差分隐私保护算法[J]. 通信学报, 2016,37(9): 175-182. |
MU H R , DING L P , SONG Y N ,et al. DiffPRFs:random forest under differential privacy[J]. Journal on Communications, 2016,37(9): 175-182. | |
[14] | 李远航, 陈先来, 刘莉 ,等. 面向差分隐私保护的随机森林算法[J]. 计算机工程, 2020,46(1): 93-101. |
LI Y H , CHEN X L , LIU L ,et al. Random forest algorithm for differential privacy protection[J]. Computer Engineering, 2020,46(1): 93-101. | |
[15] | 邓蔚, 陈秀婷, 张清华 ,等. 基于树模型的差分隐私保护算法[J]. 重庆邮电大学学报(自然科学版), 2020,32(5): 848-856. |
DENG W , CHEN X T , ZHANG Q H ,et al. Differential privacy protection algorithms based on tree model[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2020,32(5): 848-856. | |
[16] | FLETCHER S , ISLAM M Z . Differentially private random decision forests using smooth sensitivity[J]. Expert Systems With Applications, 2017,78: 16-31. |
[17] | GUAN Z T , SUN X W , SHI L Y ,et al. A differentially private greedy decision forest classification algorithm with high utility[J]. Computers& Security, 2020,96:101930. |
[18] | FLETCHER S , ISLAM M Z . A differentially private random decision forest using reliable signal-to-noise ratios[C]// Australasian Joint Conference on Artificial Intelligence. Berlin:Springer, 2015: 192-203. |
[19] | LI X X , LIU J , LIU S F ,et al. Differentially private ensemble learning for classification[J]. Neurocomputing, 2021,430: 34-46. |
[20] | GAMBS S , KéGL B , A?MEUR E , . Privacy-preserving boosting[J]. Data Mining and Knowledge Discovery, 2007,14(1): 131-170. |
[21] | LI Y , BAI C X , REDDY C K . A distributed ensemble approach for mining healthcare data under privacy constraints[J]. Information Sciences, 2016,330: 245-259. |
[22] | 沈思倩 . 关于差分隐私保护分类算法的研究[D]. 南京:南京航空航天大学, 2017. |
SHEN S Q . Research on the differential privacy classification algorithms[D]. Nanjing:Nanjing University of Aeronautics and Astronautics, 2017. | |
[23] | 贾俊杰, 邱万勇, 马慧芳 . 差分隐私保护约束下集成分类算法的研究[J]. 信息安全学报, 2021,6(4): 106-118. |
JIA J J , QIU W Y , MA H F . Research on an ensemble classification algorithm under differential privacy[J]. Journal of Cyber Security, 2021,6(4): 106-118. | |
[24] | LI Q B , WU Z M , WEN Z Y ,et al. Privacy-preserving gradient boosting decision trees[J]. Proceedings of the AAAI Conference on Artificial Intelligence, 2020,34(1): 784-791. |
[25] | FREUND Y , SCHAPIRE R E . A decision-theoretic generalization of on-line learning and an application to boosting[J]. Journal of Computer and System Sciences, 1997,55(1): 119-139. |
[26] | FREUND Y , SCHAPIRE R E . Experiments with a new Boosting algorithm[C]// Proceedings of the 13th Conference on Machine Learning.San Francisco:Morgan Kaufmann Publishers Inc. , 1996: 148-156. |
[27] | 曹莹, 苗启广, 刘家辰 ,等. AdaBoost 算法研究进展与展望[J]. 自动化学报, 2013,39(6): 745-758. |
CAO Y , MIAO Q G , LIU J C ,et al. Advance and prospects of AdaBoost algorithm[J]. Acta Automatica Sinica, 2013,39(6): 745-758. | |
[28] | FRIEDMAN J , HASTIE T , TIBSHIRANI R . Additive logistic regression:a statistical view of boosting[J]. The Annals of Statistics, 2000,28(2): 337-407. |
[29] | 燕会霞 . 简谐振动与摆动数列的通项公式[J]. 数学教学, 2006(9): 19-20. |
YAN H X . General formula of simple harmonic vibration and swing sequence[J]. Mathematics teaching, 2006(9): 19-20. | |
[30] | 邱万勇 . 基于差分隐私的集成分类算法及应用研究[D]. 兰州:西北师范大学, 2021. |
QIU W Y . A study of ensemble classification algorithms and applications based on differential privacy[D]. Lanzhou:Northwest Normal University, 2021. |
[1] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[2] | Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU. DAGUARD: distributed backdoor attack defense scheme under federated learning [J]. Journal on Communications, 2023, 44(5): 110-122. |
[3] | Lingtao TANG, Di WANG, Shengyun LIU. Data augmentation scheme for federated learning with non-IID data [J]. Journal on Communications, 2023, 44(1): 164-176. |
[4] | Chengsheng YUAN, Qiang GUO, Zhangjie FU. Copyright protection algorithm based on differential privacy deep fake fingerprint detection model [J]. Journal on Communications, 2022, 43(9): 181-193. |
[5] | Hanyi WANG, Xiaoguang LI, Wenqing BI, Yahong CHEN, Fenghua LI, Ben NIU. Multi-level local differential privacy algorithm recommendation framework [J]. Journal on Communications, 2022, 43(8): 52-64. |
[6] | Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG. Privacy-protected crowd-sensed data trading algorithm [J]. Journal on Communications, 2022, 43(5): 1-13. |
[7] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[8] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[9] | Si CHEN, Anmin FU, Mang SU, Huaijiang SUN. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64. |
[10] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[11] | Jianping CAI, Ximeng LIU, Jinbo XIONG, Zuobin YING, Yingjie WU. Approximation method of multiple consistency constraint under differential privacy [J]. Journal on Communications, 2021, 42(6): 107-117. |
[12] | Suxia ZHU, Shulun LIU, Guanglu SUN. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means [J]. Journal on Communications, 2021, 42(2): 113-123. |
[13] | Yang LIU, Jun LI, Wenyun CHEN, Mugen PENG. Research on endogenous security data sharing mechanism of F-RAN for 6G [J]. Journal on Communications, 2021, 42(1): 67-78. |
[14] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
[15] | ZHOU Yihui,LU Laifeng,WU Zhenqiang. Study on utility optimization for randomized response mechanism [J]. Journal on Communications, 2019, 40(6): 74-81. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|