Counterterrorism: Privately Clustering A Radical Social Network Data
Journal Title: Transactions on Machine Learning and Artificial Intelligence - Year 2017, Vol 5, Issue 4
Abstract
The tradeoff between the needed or essential gathering and analysis of personal data and the privacy rights of individuals is now an important requirement under any counterterrorism program. The most famous and controversial recent example is the revelation that US intelligence agencies systemically engage in “bulk collection” of civilian “metadata” detailing telephonic and other types of communication and activities, with the alleged purpose of monitoring and thwarting terrorist activity. Differential privacy provides one of the strongest privacy guarantees up to now. In this paper, we present a new provably privacypreserving algorithm able to identify and take action upon members of the targeted subpopulation. Meanwhile, avoiding compromising the privacy of the patriot subpopulation. It is a new algorithm for search methods which use a new combination of nodes social similarity and differential privacy.
Authors and Affiliations
Jamal Boujmil, N. Tagmouti
Architecture of A Semantic Annotation of Handwritten Documents Based on the Ontology "OMOS"
In this work we propose to present an application that supports the representation of manuscript documents according to an ontological approach. The implementation of this application makes it possible to annotate semant...
Digitizing Human Sciences to Determine the Individual's Personality Based on Facial Emotions Recognition
Informatics is a science that develops and opens up to a group of other sciences. The current researches have been established for multiple partnerships between informatics and the rest of the sciences. This is noticed i...
The GeoRSS Model and the Design of a Ranking Algorithm in Semantic Web
Ecommerce has become nowadays an influential actor in the international trade industry and has greatly contributed in the economic development of nations. The fact of dealing with this field along with the evolution of t...
New Cloud Economy For Resolving A Problem Cloud Computing Adoption
Cloud computing , IT still called to order, it is a model that allows access to information resources on demand, we can consider it as a unique Technology to satisfy needs and respond to customer demands by guaranteeing...
Feature-rich PoS Tagging through Taggers Combination : Experience in Arabic
Since words can play different syntactic roles in different contexts, it is not trivial to assign the appropriate morphosyntactic category to each word according to the context. Part of Speech (PoS) tagging is the task w...