posted by user: swliu1440 || 3432 views || tracked by 3 users: [display]

APDM 2017 : IJCAI 2017 Workshop: Abuse Preventive Data Mining 2017


When Aug 19, 2017 - Aug 21, 2017
Where Melbourne
Submission Deadline May 7, 2017
Notification Due Jun 7, 2017
Categories    data mining   data privacy   data security   information abuse

Call For Papers

*** APDM 2017 Call for Papers ***


IJCAI 2017 Workshop: Abuse Preventive Data Mining 2017

Submission System:

Workshop paper will be invited for extension for the special issue of an international
journal of Intelligent Data Analysis (SCI)



Important Dates

Paper Submission Due: 07/05/2017
Author Notification Due: 07/06/2017
Conference Days: 19-21/08/2017

APDM 2017 Workshop Scope

This workshop is with the Twenty-sixth International Joint Conference on Artificial Intelligence
(IJCAI-17) will be held in Melbourne, Australia, August 19-25, 2017.

We solicit contributions on the advanced techniques for Abuse Preventive Data Mining.

Data mining critically relies on the information (data and domain knowledge) disclosure
from the data curator, and the information accessibility from the data miners. This fully
or partial transfer of information ownership, if not done properly, may lead to information
abuse. Here, information abuse is referred to the disclosure of important information for
which the data owners are not willing to disclose, including but not limited to the private
information of users, the trade secret of businesses, etc.

Abuse Preventive Data Mining (APDM) aims to curb the potential information abuse across
different steps of data mining. There are various related studies such as privacy-preserving
data mining, data security, data propriety maintenance, distributed learning, etc.
These efforts, however, are disparate in different domains. Now it is the time to revisit
from a unified perspective, especially when considering the fact that most related studies
can be categorized based on their levels of information ownership transferring:

- Full Access to Data: data will be processed before releasing.
- Partial Access to Data: distributed data access.
- No Access to Data: access to intermediate result.

Advances in abuse protective data mining will result in safer collaboration and trusted
information sharing. We believe that it is a good time to cover these topics in the workshop,
which offers a timely forum for researchers and industry partners to present and discuss
latest advances in abuse preventive data mining.

Topics of Interest

To further contribute to the understanding of Abuse Preventive Data Mining, we invite original
articles in relevant topics, which include but are not limited to:

* Formal Methods
- Statistical Framework
- Privacy Utility Tradeoff

* Information Abuse
- Ownership Abuse
- Ownership Transfer
- Abuse Prevention

* Data Analytics
- Trusted Data Flow
- Trusted and Trustworthy Data Mining

* Data Privacy
- Privacy Preserving Intelligent Systems
- Privacy Preserving Data Publishing
- Privacy in Information Sharing
- Economics of Privacy

* Data Security
- Data Permission Abuse
- Electronic Commerce Security
- Data Protection in Outsourcing

Paper Submissions

Formatting Guidelines, LaTeX Styles and Word Template can be dowloaded

The submission site is
available at


Workshop papers accepted and presented in APDM 2017 will be
invited to be extended for the possible inclusion of special issue of
journal of Intelligent Data Analytics.

Please note that authors of accepted special issue articles are required
to pay US$350 or €300 publication fee before their papers being published
by journal of Intelligent Data Analytics.


- Gang Li, Deakin University, Australia
- Zhi-Hua Zhou, Nanjing University, China

PC Members

- Mohammad Alaggan, Helwan University, Egypt
- Ruichuan Chen, Nokia Bell Labs
- Rui Chen, Samsung Research America, USA
- Chris Clifton, Purdue University, USA
- Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
- Yuan Hong, University at Albany, USA
- Shiva Kasiviswanathan, Pennsylvania State University, USA
- Xiang-Yang Li, Illinois Institute of Technology, USA
- Ninghui Li, Purdue University, USA
- Xiaofeng Meng, Renmin University of China, China
- Kui Ren, State University of New York at Buffalo, USA
- Yilin Shen, Samsung Research America, USA
- Xintao Wu, University of Arkansas, USA
- Yin Yang, Hamad Bin Khalifa University, Qatar
- Ting Yu, Qatar Computing Research Institute, Qatar
- Philip Yu, University of Illinois at Chicago, USA
- Xiaojian Zhang, Henan University of Economics and Law, China
- Sheng Zhong, Nanjing University, China

Related Resources

IJCAI 2021   30th International Joint Conference on Artificial Intelligence
WSDM 2022   Web Search and Data Mining
DASFAA 2022   Database Systems for Advanced Applications
MECHATROJ 2021   Mechatronics and Applications: An International Journal (MECHATROJ)
DMCIT 2022   2022 6th International Conference on Data Mining, Communications and Information Technology (DMCIT 2022)
MLNLP 2021   2nd International Conference on Machine Learning Techniques and NLP
MLLD 2021   Second International Workshop on Mining and Learning in the Legal Domain
DTMN 2021   7th International Conference on Data Mining
MSA 2021   Multivariate Statistical Analysis
DMSE 2021   2nd International Conference on Data Mining and Software Engineering