308
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Application Research of Data Mining Technology in Personal Privacy Protection and Material Data Analysis

&
Pages 29-42 | Received 29 Sep 2020, Accepted 15 Feb 2021, Published online: 30 Jun 2021

References

  • Z. Lv et al., Intelligent security planning for regional distributed energy internet, IEEE Trans. Ind. Inf. 16 (5), 3540 (2020). DOI: 10.1109/TII.2019.2914339.
  • Z. Wang, M. Wang, and Q. Yong, Materials informatics and its application in materials research, Mater. China 36 (2), 132 (2017).
  • F. Piccialli and Z. Lv, The security of medical data on internet based on differential privacy technology, ACM Transactions on Internet Technology (2020).
  • H. Zhao and H. Dong, Research on personal privacy protection of China in the era of big data, J. Soc. Sci. 05 (06), 139 (2017). DOI: 10.4236/jss.2017.56012.
  • V. Ford, A. Siraj, and M. Ashiqur Rahman, Secure and efficient protection of consumer privacy in advanced metering infrastructure supporting fine-grained data analysis, J. Comput. Syst. Sci. 83 (1), 84 (2017). DOI: 10.1016/j.jcss.2016.06.005.
  • Z. Lv et al., Next-generation big data analytics: state of the art, challenges, and future research topics, IEEE Trans. Ind. Inf. 13 (4), 1891 (2017). DOI: 10.1109/TII.2017.2650204.
  • M. Liu, M. Qu, and B. Zhao, Research and citation analysis of data mining technology based on Bayes algorithm, Mob. Netw. Appl. 22 (3), 1 (2016).
  • J. Wang, Analysis on the development of modern agriculture based on data mining, Boletin Tecnico/Technical Bulletin 55 (4), 347 (2017).
  • S. Houbing, G. A. Fink, and J. Sabina, Security and privacy in cyber-physical systems: foundations, in Principles and Applications (Wiley-IEEE Press, Chichester, UK, 2017), pp. 1–472.
  • L. Xin, Research of food safety risk assessment system based on data mining, Adv. J. Food Sci. Technol. 8 (10), 707 (2015). DOI: 10.19026/ajfst.8.1593.
  • S.-B. Tsai et al., Discussing measurement criteria and competitive strategies of green suppliers from a Green law Perspective, Proc. Inst. Mech. Eng. B J. Eng. Manuf. 229 (1_suppl), 135 (2015). DOI: 10.1177/0954405414558740.
  • W.-H. Chen et al., Analysis of meridians and acupoints rules in acupuncture treatment of dysmenorrhea based on data mining, Zhen Ci Yan Jiu 42 (5), 467 (2017).
  • Q. Xu. Analysis of financial data anomaly based on data mining technology, Revista de la Facultad de Ingenieria 32 (5), 338 (2017).
  • M. Gangappa, C. Kiran Mai, and P. Sammulal, Analysis of advanced data mining prototypes in spatial data analysis, J. Eng. Appl. Sci. 12 (12), 3213 (2017).
  • C. Yi-Ran, L. Xin, and S. Dan, Data mining analysis of regularity of formulas containing Salviae Miltiorrhizae Radix et Rhizoma-Carthami Flos medicin pair in dictionary of Chinese medicine prescription, Chin. J. Chin. Mater. Med. 41 (3), 528 (2016).
  • R. Kaur and S. Singh, A survey of data mining and social network analysis based anomaly detection techniques, Egypt. Inform. J. 17 (2), 199 (2016). DOI: 10.1016/j.eij.2015.11.004.
  • I. Medeiros, N. Neves, and M. Correia, Detecting and removing web application vulnerabilities with static analysis and data mining, IEEE Trans. Rel. 65 (1), 54 (2016). DOI: 10.1109/TR.2015.2457411.
  • Q. Xue, Y. Zhu, and J. Wang, Joint distribution estimation and nave bayes classification under local differential privacy, IEEE Transactions on Emerging Topics in Computing, 99 1, (2020).
  • Z. Lv and L. Qiao, Analysis of healthcare big data, Future Gener. Comput. Syst. 109, 103 (2020). DOI: 10.1016/j.future.2020.03.039.
  • R. Shubhangi and R. Suraj, Study and analysis of multi-label classification methods in data mining, Int. J. Comput. Appl. 159 (9), 9 (2017). DOI: 10.5120/ijca2017913035.
  • H. H. Kim and H. Y. Rhee, Trend analysis of data mining research using topic network analysis, J. Korea Soc. Comput. Inf. 21 (11), 141 (2016). DOI: 10.9708/jksci.2016.21.11.141.
  • L. U. Lili, Z. Yongpan, and T. Haiyu, Research on classification algorithm and concept drift based on big data, J. Front. Comput. Sci. Technol. 10 (12), 1683 (2016).
  • R. Sethi, Analysis and application of data mining by the implementation of big data, Int. J. Comput. Appl. 128 (2), 45 (2015). DOI: 10.5120/ijca2015906456.
  • L.-J. Wang, Z.-W. He, and P.-X. Feng, Study of outlier data mining algorithm based on ICA, Dianzi Keji Daxue Xuebao/J. Univer. Electron. Sci. Technol. China 44 (2), 211 (2015).
  • S. P. Nagarkar and R. Kumbhar, Text mining: an analysis of research published under the subject category ‘Information Science Library Science’ in Web of Science Database during 1999-2013, Libr. Rev. 64 (3), 248 (2015). DOI: 10.1108/LR-08-2014-0091.
  • K. Guo, Research on location selection model of distribution network with constrained line constraints based on genetic algorithm, Neural Comput. Appl. 1 (1), 2019 (2019).
  • F. Zuha and G. Achuthan, Analysis of data mining techniques and its applications, Int. J. Comput. Appl. 140 (3), 6 (2016). DOI: 10.5120/ijca2016909249.
  • G. A. O. Caiyun and C. U. I. Ximin, Analysis of grey neural network and its application in landslide deformation prediction, J. Geod. Geodyn. 14 (3), 743 (2015).
  • M. E. Lokanan, Data mining for statistical analysis of money laundering transactions, J. Money Laund. Control 22 (4), 753 (2019). DOI: 10.1108/JMLC-03-2019-0024.
  • B. Cao et al., Multiobjective evolution of fuzzy rough neural network via distributed parallelism for stock prediction, IEEE Trans. Fuzzy Syst. 28 (5), 939 (2020). DOI: 10.1109/TFUZZ.2020.2972207.
  • Z. Yu, Q. Mingming, and H. Xiangdong, Automatic component selection and parameter configuration in development of big data system, J. Front. Comput. Sci. Technol. 10 (9), 1211 (2016).
  • C. Zhao and J. Li, Equilibrium selection under the Bayes-based strategy updating rules, Symmetry 12 (5), 739 (2020). DOI: 10.3390/sym12050739.
  • J. Yanfeng, L. Gang, and Z. Chang, Study of data mining in social network analysis, J. Inf. Comput. Sci. 12 (16), 5947 (2015).
  • A. Junior, A. José, and H. Luis, Pattern recognition system based on data mining for analysis of chemical substances in Brain, Computacion Y Sistemas 19 (1), 89 (2015).
  • R. Gupta, Analysis and design of data mining techniques for prevention and detection of financial frauds, Navigation 31 (9), 711 (2015).
  • L. Zhihan, L. Qiao, and Amit Kumar Singh, Advanced machine learning on cognitive computing for human behavior analysis. IEEE Trans. Comput. Soc. Syst. (2020).
  • S. N. Mohanty et al., Deep learning with LSTM based distributed data mining model for energy efficient wireless sensor networks, Phys. Commun. 40, 101097 (2020). DOI: 10.1016/j.phycom.2020.101097.
  • T. Sang-Bing et al., Examining how manufacturing corporations win orders, S Afr. J. Ind. Eng. 24 (3), 112 (2013).
  • C. H. Wu and S. B. Tsai, Using DEMATEL-based ANP model to measure the successful factors of E-commerce, J. Glob. Inf. Manag. 26 (1), 120 (2018).
  • A. M. Eassa et al., NoSQL injection attack detection in web applications using RESTful service, Program. Comput. Soft. 44 (6), 435 (2018). DOI: 10.1134/S036176881901002X.
  • Y. Zhang et al., Secure and efficient outsourcing of PCA-based face recognition, IEEE Transinformforensic. Secur. 15, 1683 (2020). DOI: 10.1109/TIFS.2019.2947872.
  • K. Shankar and Mohamed Elhoseny , Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES, J. Univers. Comput. Sci. 25 (10), 1221 (2019).
  • I. M. El-Hasnony et al., Improved feature selection model for big data analytics, IEEE Access 8 (1), 66989 (2020). DOI: 10.1109/ACCESS.2020.2986232.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.