Counterterrorism: Privately Clustering A Radical Social Network Data

Journal Title: Transactions on Machine Learning and Artificial Intelligence - Year 2017, Vol 5, Issue 4

Abstract

The tradeoff between the needed or essential gathering and analysis of personal data and the privacy rights of individuals is now an important requirement under any counterterrorism program. The most famous and controversial recent example is the revelation that US intelligence agencies systemically engage in “bulk collection” of civilian “metadata” detailing telephonic and other types of communication and activities, with the alleged purpose of monitoring and thwarting terrorist activity. Differential privacy provides one of the strongest privacy guarantees up to now. In this paper, we present a new provably privacypreserving algorithm able to identify and take action upon members of the targeted subpopulation. Meanwhile, avoiding compromising the privacy of the patriot subpopulation. It is a new algorithm for search methods which use a new combination of nodes social similarity and differential privacy.

Authors and Affiliations

Jamal Boujmil, N. Tagmouti

Keywords

Related Articles

New Cloud Economy For Resolving A Problem Cloud Computing Adoption

Cloud computing , IT still called to order, it is a model that allows access to information resources on demand, we can consider it as a unique Technology to satisfy needs and respond to customer demands by guaranteeing...

A Model- Based Research Material Recommendation System For Individual Users

As there is an enormous amount of online research material available, finding pertinent information for specific purposes has become a tedious chore. So there is a requirement of the research paper recommendation system...

Combining Overall and Target Oriented Sentiment Analysis over Portuguese Text from Social Media

This document describes an approach to perform sentiment analysis on social media Portuguese content. In a single system, we perform polarity classification for both the overall sentiment, and target oriented sentiment....

Disassembly Modeling of an of End-Of-Life (EOL) Mechanical Damper for Recycling

Today’s rapidly developing technologies and product designs have enabled manufacturers to deliver new products to consumers at a dramatic rate. This has in turn resulted in shorter lifespan for products, because, more of...

A Coordinate Transformation Method based on the Random Variable for Showing the Optical Properties

A coordinate transformation method of square projection circular with random various has been proposed for the optical properties of the cloaking material. The square produced randomly is projected to the circle and all...

Download PDF file
  • EP ID EP309081
  • DOI 10.14738/tmlai.54.3204
  • Views 60
  • Downloads 0

How To Cite

Jamal Boujmil, N. Tagmouti (2017). Counterterrorism: Privately Clustering A Radical Social Network Data. Transactions on Machine Learning and Artificial Intelligence, 5(4), 346-354. https://europub.co.uk./articles/-A-309081