In the area of industrial process mining, privacy-preserving event data publication is becoming increasingly relevant. Consequently, the trade-off between high data utility and quantifiable privacy poses new challenges. State-of-the-art research mainly focuses on differentially private trace variant construction based on prefix expansion methods. However, these algorithms face several practical limitations such as high computational complexity, introducing fake variants, removing frequent variants, and a bounded variant length. In this paper, we introduce a new approach for direct differentially private trace variant release which uses anonymized \textit{partition selection} strategies to overcome the aforementioned restraints. Experimental...
Data often contains sensitive information, which poses a major obstacle to publishing it. Some sugge...
Process mining has been successfully applied in the healthcare domain and helped to uncover various ...
The availability of large amounts of informative data is crucial for successful machine learning. Ho...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
Releasing state samples generated by a dynamical system model, for data aggregation purposes, can al...
This paper summarizes the panel discussion at the 1st Workshop on Trust and Privacy in Process Analy...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
This work considers software execution traces, where a trace is a sequence of run-time events. Each ...
Part 3: Security AnalysisInternational audienceOriginally proposed for privacy protection in the con...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
In a world where artificial intelligence and data science become omnipresent, data sharing is increa...
In this dissertation, I am going to introduce my work on differentially privatedata mining. There ar...
Data often contains sensitive information, which poses a major obstacle to publishing it. Some sugge...
Process mining has been successfully applied in the healthcare domain and helped to uncover various ...
The availability of large amounts of informative data is crucial for successful machine learning. Ho...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
Releasing state samples generated by a dynamical system model, for data aggregation purposes, can al...
This paper summarizes the panel discussion at the 1st Workshop on Trust and Privacy in Process Analy...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
This work considers software execution traces, where a trace is a sequence of run-time events. Each ...
Part 3: Security AnalysisInternational audienceOriginally proposed for privacy protection in the con...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
In a world where artificial intelligence and data science become omnipresent, data sharing is increa...
In this dissertation, I am going to introduce my work on differentially privatedata mining. There ar...
Data often contains sensitive information, which poses a major obstacle to publishing it. Some sugge...
Process mining has been successfully applied in the healthcare domain and helped to uncover various ...
The availability of large amounts of informative data is crucial for successful machine learning. Ho...