Title | ||
---|---|---|
Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation. |
Abstract | ||
---|---|---|
When a company lacks local data in hand, engineers can build an effort model for the effort estimation of a new project by utilizing the training data shared by other companies. However, one of the most important obstacles for data sharing is the privacy concerns of software development organizations. In software engineering, most of existing privacy-preserving works mainly focus on the defect prediction, or debugging and testing, yet the privacy-preserving data sharing problem has not been well studied in effort estimation. In this paper, we aim to provide data owners with an effective approach of privatizing their data before release. We firstly design an Interval Covering based Subclass Division (ICSD) strategy. ICSD can divide the target data into several subclasses by digging a new attribute (i.e., class label) from the effort data. And the obtained class label is beneficial to maintaining the distribution of the target data after obfuscation. Then, we propose a manifold learning based bi-directional data obfuscation (MLBDO) algorithm, which uses two nearest neighbors, which are selected respectively from the previous and next subclasses by utilizing the manifold learning based nearest neighbor selector, as the disturbances to obfuscate the target sample. We call the entire approach as ICSD&MLBDO. Experimental results on seven public effort datasets show that: 1) ICSD&MLBDO can guarantee the privacy and maintain the utility of obfuscated data. 2) ICSD&MLBDO can achieve better privacy and utility than the compared privacy-preserving methods. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1145/2970276.2970302 | ASE |
Keywords | Field | DocType |
Effort estimation, Privacy-preserving, Locality preserving projection, Subclass division | Data mining,Computer science,Server,Decision support system,Data sharing,Theoretical computer science,Information privacy,Obfuscation,Nonlinear dimensionality reduction,Software development,Debugging | Conference |
ISSN | ISBN | Citations |
1527-1366 | 978-1-5090-5571-5 | 1 |
PageRank | References | Authors |
0.35 | 44 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Fumin Qi | 1 | 5 | 0.76 |
Xiao-Yuan Jing | 2 | 769 | 55.18 |
Xiaoke Zhu | 3 | 78 | 7.77 |
Fei Wu | 4 | 124 | 7.11 |
Cheng Li | 5 | 279 | 39.13 |