Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Authors » Haythem Hayouni

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Enhancing privacy in clustering and data mining: A novel approach for sensitive data protection Pages 345-356 Right click to download the paper Download PDF

Authors: Haythem Hayouni

DOI: 10.5267/j.ijdns.2025.6.002

Keywords: Data mining, Clustering, Privacy-Preserving, Secure Data Mining, Blockchain

Abstract:
In the era of big data, clustering and data mining have become essential tools for uncovering patterns and insights from vast datasets. However, these processes often involve the use of sensitive data, raising significant concerns about privacy, security, and trustworthiness. This paper proposes N2P-CM, a novel privacy-preserving framework designed to protect sensitive information during the entire clustering and mining lifecycle. Unlike existing methods that focus on partial aspects of security or apply generic encryption techniques, N2P-CM integrates five innovative and synergistic modules: Sensitive Feature Obfuscation, Adaptive Trust Weight Aggregation, Compressed Secure Semantic Embedding, Differential Traceable Execution Engine, and Blockchain Auditable Ledger. Each module contributes a distinct layer of privacy and accountability, ranging from feature-level data transformation and federated trust scoring to secure semantic encoding and traceable execution logging with blockchain support. We provide formal definitions and algorithms for each module and demonstrate their integration in a unified architecture. Extensive simulations using real-world datasets validate the efficacy of N2P-CM, showing that it achieves strong privacy guarantees with minimal degradation in clustering accuracy. This research contributes a comprehensive and modular solution to the growing need for privacy-preserving analytics in sensitive domains such as healthcare, finance, and smart cities.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 3 | Views: 313 | Reviews: 0

 

® 2010-2026 GrowingScience.Com