posted by user: swliu1440 || 3228 views || tracked by 3 users: [display]

APDM 2017 : IJCAI 2017 Workshop: Abuse Preventive Data Mining 2017


When Aug 19, 2017 - Aug 21, 2017
Where Melbourne
Submission Deadline May 7, 2017
Notification Due Jun 7, 2017
Categories    data mining   data privacy   data security   information abuse

Call For Papers

*** APDM 2017 Call for Papers ***


IJCAI 2017 Workshop: Abuse Preventive Data Mining 2017

Submission System:

Workshop paper will be invited for extension for the special issue of an international
journal of Intelligent Data Analysis (SCI)



Important Dates

Paper Submission Due: 07/05/2017
Author Notification Due: 07/06/2017
Conference Days: 19-21/08/2017

APDM 2017 Workshop Scope

This workshop is with the Twenty-sixth International Joint Conference on Artificial Intelligence
(IJCAI-17) will be held in Melbourne, Australia, August 19-25, 2017.

We solicit contributions on the advanced techniques for Abuse Preventive Data Mining.

Data mining critically relies on the information (data and domain knowledge) disclosure
from the data curator, and the information accessibility from the data miners. This fully
or partial transfer of information ownership, if not done properly, may lead to information
abuse. Here, information abuse is referred to the disclosure of important information for
which the data owners are not willing to disclose, including but not limited to the private
information of users, the trade secret of businesses, etc.

Abuse Preventive Data Mining (APDM) aims to curb the potential information abuse across
different steps of data mining. There are various related studies such as privacy-preserving
data mining, data security, data propriety maintenance, distributed learning, etc.
These efforts, however, are disparate in different domains. Now it is the time to revisit
from a unified perspective, especially when considering the fact that most related studies
can be categorized based on their levels of information ownership transferring:

- Full Access to Data: data will be processed before releasing.
- Partial Access to Data: distributed data access.
- No Access to Data: access to intermediate result.

Advances in abuse protective data mining will result in safer collaboration and trusted
information sharing. We believe that it is a good time to cover these topics in the workshop,
which offers a timely forum for researchers and industry partners to present and discuss
latest advances in abuse preventive data mining.

Topics of Interest

To further contribute to the understanding of Abuse Preventive Data Mining, we invite original
articles in relevant topics, which include but are not limited to:

* Formal Methods
- Statistical Framework
- Privacy Utility Tradeoff

* Information Abuse
- Ownership Abuse
- Ownership Transfer
- Abuse Prevention

* Data Analytics
- Trusted Data Flow
- Trusted and Trustworthy Data Mining

* Data Privacy
- Privacy Preserving Intelligent Systems
- Privacy Preserving Data Publishing
- Privacy in Information Sharing
- Economics of Privacy

* Data Security
- Data Permission Abuse
- Electronic Commerce Security
- Data Protection in Outsourcing

Paper Submissions

Formatting Guidelines, LaTeX Styles and Word Template can be dowloaded

The submission site is
available at


Workshop papers accepted and presented in APDM 2017 will be
invited to be extended for the possible inclusion of special issue of
journal of Intelligent Data Analytics.

Please note that authors of accepted special issue articles are required
to pay US$350 or €300 publication fee before their papers being published
by journal of Intelligent Data Analytics.


- Gang Li, Deakin University, Australia
- Zhi-Hua Zhou, Nanjing University, China

PC Members

- Mohammad Alaggan, Helwan University, Egypt
- Ruichuan Chen, Nokia Bell Labs
- Rui Chen, Samsung Research America, USA
- Chris Clifton, Purdue University, USA
- Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
- Yuan Hong, University at Albany, USA
- Shiva Kasiviswanathan, Pennsylvania State University, USA
- Xiang-Yang Li, Illinois Institute of Technology, USA
- Ninghui Li, Purdue University, USA
- Xiaofeng Meng, Renmin University of China, China
- Kui Ren, State University of New York at Buffalo, USA
- Yilin Shen, Samsung Research America, USA
- Xintao Wu, University of Arkansas, USA
- Yin Yang, Hamad Bin Khalifa University, Qatar
- Ting Yu, Qatar Computing Research Institute, Qatar
- Philip Yu, University of Illinois at Chicago, USA
- Xiaojian Zhang, Henan University of Economics and Law, China
- Sheng Zhong, Nanjing University, China

Related Resources

ICDM 2021   21th Industrial Conference on Data Mining
IJCAI 2020   International Joint Conference on Artificial Intelligence
MLDM 2021   17th International Conference on Machine Learning and Data Mining
ICDE 2021   International Conference on Data Engineering
IJCAI 2021   30th International Joint Conference on Artificial Intelligence
IoTE 2020   International Conference on Internet of Things & Embedded Systems
ICSRS--Scopus & EI Compendex 2021   2021 5th International Conference on System Reliability and Safety (ICSRS 2021)--Scopus & EI Compendex
CISDM 2020   2020 2nd Euro-Asia Conference on Information System and Data Mining (CISDM 2020)
COMIT 2020   4th International Conference on Computer Science and Information Technology
CCBD--Ei & Scopus 2021   2021 The 8th International Conference on Cloud Computing and Big Data (CCBD 2021)--Ei Compendex & Scopus