ProcessGAN: Generating Privacy-Preserving Time-Aware Process Data with Conditional Generative Adversarial Nets
Abstract
References
Index Terms
- ProcessGAN: Generating Privacy-Preserving Time-Aware Process Data with Conditional Generative Adversarial Nets
Recommendations
Privacy-preserving process mining: A microaggregation-based approach
AbstractThe proper exploitation of vast amounts of event data by means of process mining techniques enables the discovery, monitoring and improvement of business processes, allowing organizations to develop more efficient business intelligence ...
Highlights- Research on privacy-preserving process mining is on the rise.
- Existing privacy-...
Privacy-Preserving Synthetic Data Generation for Recommendation Systems
SIGIR '22: Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information RetrievalRecommendation systems make predictions chiefly based on users' historical interaction data (e.g., items previously clicked or purchased). There is a risk of privacy leakage when collecting the users' behavior data for building the recommendation model. ...
Differential Privacy Generative Adversarial Networks in Recommendation Systems
CAIBDA '24: Proceedings of the 2024 4th International Conference on Artificial Intelligence, Big Data and AlgorithmsRecommendation systems provide personalized content and product recommendations by analyzing user behavior and preferences. However, the accuracy and reliability of such recommendations rely heavily on large amounts of historical datasets, predictive ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 120Total Downloads
- Downloads (Last 12 months)120
- Downloads (Last 6 weeks)52
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in