https://www.plomscience.com/journals/index.php/PLOMSAI/issue/feed PLOMS AI 2025-05-09T14:49:00-07:00 PLOMS AI [email protected] Open Journal Systems <p><strong>PLOMS AI </strong>is a comprehensive journal aiming to proceed science-society interactions . The open access strategy offers increased vulnerability of the research and help in dissemination of research results, as well. We believe that all accurate scientific results have to be published and disseminated by being freely accessible to all.<br /><br /><strong>PLOMS AI</strong> accepts research in areas related to Artificial Intelligence, Computational Intelligence, and bio inspired related areas. The submitted manuscripts are evaluated on the basis of high ethical standards, accurate methodology, scientific and perceived novelty.<br /><br /><strong>Types of articles:</strong><br /><strong>Original research</strong> that contributes to the base of scientific knowledge <br /><strong>Systematic reviews </strong>whose methods ensure the comprehensive and unbiased sampling of existing literature.<br /><strong>Qualitative research</strong> that adheres to appropriate study design and reporting guidelines.<br /><strong>Other submissions</strong> that describes methods, software, databases, or other tools that if they follow the appropriate reporting guidelines. accepts research in areas related to Artificial Intelligence, Computational Intelligence, and bio inspired related areas. The submitted manuscripts are evaluated on the basis of high ethical standards, accurate methodology, scientific and perceived novelty.</p> https://www.plomscience.com/journals/index.php/PLOMSAI/article/view/24 A Survey on Privacy Preserving Data Mining Techniques 2025-05-09T14:37:50-07:00 Aziza Aldfaii [email protected] Rabie Ramadan [email protected] <p>Privacy-preserving data mining (PPDM) has become a significant area of<br>interest for researchers, facilitating the sharing and analysis of sensitive information while<br>ensuring privacy protection. This paper investigates methods for maintaining data confidentiality<br>while retaining the critical attributes necessary for analysis. The authors assess<br>the efficacy of various PPDM techniques against criteria such as performance, data usability,<br>and levels of uncertainty. The key findings and limitations of each approach are<br>thoroughly reviewed and summarized. Various PPDM techniques present distinct advantages<br>alongside certain limitations: Anonymization guarantees the anonymity of data<br>owners but is vulnerable to linking attacks. Perturbation protects attributes independently<br>but does not allow for the reconstruction of original values from the altered data.<br>Randomization provides robust privacy protection but diminishes data utility due to the<br>introduction of noise. Cryptographic methods offer strong security and utility but tend to<br>be less efficient than other strategies. No single technique outperforms all criteria; rather,<br>each is more effective under particular circumstances. This paper delivers a comparative<br>analysis of PPDM techniques, emphasizing their strengths and weaknesses, and offers<br>insights into their applicability across different scenarios.</p> 2025-05-01T00:00:00-07:00 Copyright (c) 2025 PLOMS AI