Hiding decision tree rules by data set operations

This paper focuses on preserving the privacy of sensitive patterns in the context of inducing decision trees. The subject at hand is approached through a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuri...

Full description

Saved in:
Bibliographic Details
Published in2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA) pp. 1 - 6
Main Authors Kalles, Dimitris, Verykios, Vassilios S., Papagelis, Athanasios
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2015
Subjects
Online AccessGet full text
DOI10.1109/IISA.2015.7387954

Cover

Abstract This paper focuses on preserving the privacy of sensitive patterns in the context of inducing decision trees. The subject at hand is approached through a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuristic solutions like output perturbation or cryptographic techniques - that restrict the usability of the data in different ways - since the raw data itself is readily available for public use. This methodology is based upon the unique characteristics of the induction of binary decision trees with binary-valued symbolic attributes and binary classes.
AbstractList This paper focuses on preserving the privacy of sensitive patterns in the context of inducing decision trees. The subject at hand is approached through a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuristic solutions like output perturbation or cryptographic techniques - that restrict the usability of the data in different ways - since the raw data itself is readily available for public use. This methodology is based upon the unique characteristics of the induction of binary decision trees with binary-valued symbolic attributes and binary classes.
Author Kalles, Dimitris
Papagelis, Athanasios
Verykios, Vassilios S.
Author_xml – sequence: 1
  givenname: Dimitris
  surname: Kalles
  fullname: Kalles, Dimitris
  email: kalles@eap.gr
  organization: Sch. of Sci. & Technol., Hellenic Open Univ., Patras, Greece
– sequence: 2
  givenname: Vassilios S.
  surname: Verykios
  fullname: Verykios, Vassilios S.
  email: verykios@eap.gr
  organization: Sch. of Sci. & Technol., Hellenic Open Univ., Patras, Greece
– sequence: 3
  givenname: Athanasios
  surname: Papagelis
  fullname: Papagelis, Athanasios
  email: papagel@efrontlearning.net
  organization: Epignosis Ltd., Athens, Greece
BookMark eNotj8tKAzEUQCPYhdZ-gLjJD8yYm5vmsSxF7UDBhXZd8rgjgTpTkrjo3yvY1dkcDpx7djvNEzH2CKIHEO55GD42vRSw7g1a49bqhq2csaC0QYcA7o7BLqc8ffFEMdc8T7wVIl5-TlR5uPDkm-eVGp_PVHz7E-oDW4z-VGl15ZIdXl8-t7tu__42bDf7LoPE1kXtg1LKapIJ7Ri9UcrEkBCiliKEpIST4BCt1SGNowtSG2m8R9Q6KINL9vTfzUR0PJf87cvleB3BXxnCQMo
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IISA.2015.7387954
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781467393119
1467393118
EndPage 6
ExternalDocumentID 7387954
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i123t-c6ab44486e2d38fca7447cbd31c620bbd40921933886bdff9b26727aa3366b473
IEDL.DBID RIE
IngestDate Thu Jun 29 18:36:04 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i123t-c6ab44486e2d38fca7447cbd31c620bbd40921933886bdff9b26727aa3366b473
PageCount 6
ParticipantIDs ieee_primary_7387954
PublicationCentury 2000
PublicationDate 20150701
PublicationDateYYYYMMDD 2015-07-01
PublicationDate_xml – month: 07
  year: 2015
  text: 20150701
  day: 01
PublicationDecade 2010
PublicationTitle 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)
PublicationTitleAbbrev IISA
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.5848645
Snippet This paper focuses on preserving the privacy of sensitive patterns in the context of inducing decision trees. The subject at hand is approached through a...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Classification algorithms
Cryptography
Data privacy
decision tree
Decision trees
Entropy
information gain
rule hiding
Yttrium
Title Hiding decision tree rules by data set operations
URI https://ieeexplore.ieee.org/document/7387954
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB3anjyptOI3e_Bo0iS7yWaPIpZWqAha6K1kdydQlLS0yaH-emeTWFE8eNssIcnshLy8nTczADf0j2zTRAtPpko6gqI8FVvhpYTtsUqzLKiJ4vQpGc_E4zyed-B2nwuDiLX4DH03rGP5dmUqt1U2lNy1xhZd6NJr1uRqtYHKMFDDyeTlzmm1Yr8970fDlBovRocw_bpTIxN586tS--bjVxHG_z7KEQy-M_PY8x5zjqGDRR_C8dIdMdv2y2Eu0sw21Ttumd4xJwJlWyzZao2Nv7cDmI0eXu_HXtsKwVsStJSeSTItiEklGFme5iaTQkijLQ9NEgVaW6Jp9O0hvkkLb_Nc6ciFWLOM84Q8IfkJ9IpVgafAchPYPMy51AFd0BUg4kTKhJSBQmEwOoO-M3exbqpdLFpLz_-evoADt-SNgPUSeuWmwiuC6VJf1_75BJlpkhc
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedCTyib-NgePtmubtGmOIo5OtyG4wW6j-VEYyjq29qB_vS9tnSgevCWhpEke9OuX9733AG7wH1nHkWQOjwW3BEU4ItTMiRHbQxGnqVcRxdE4SqbscRbOWnC7jYUxxlTiM-PaZuXL17kq7VVZj1NbGpvtwC7iPgvraK3GVel7ojcYvNxZtVboNk_-KJlSIUb_AEZf76qFIq9uWUhXffxKw_jfxRxC9zs2jzxvUecIWmbZAT9Z2B7RTcUcYn3NZF2-mQ2R78TKQMnGFCRfmdrimy5M-w-T-8RpiiE4CwSXwlFRKhlyqcgEmsaZSjljXElNfRUFnpQaiRp-fZBx4tHrLBMysE7WNKU0QltwegztZb40J0Ay5enMzyiXHk5oUxBRpGWMc08YpkxwCh273fmqzncxb3Z69vfwNewlk9FwPhyMn85h3x5_LWe9gHaxLs0lgnYhrypbfQJy-pVk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+6th+International+Conference+on+Information%2C+Intelligence%2C+Systems+and+Applications+%28IISA%29&rft.atitle=Hiding+decision+tree+rules+by+data+set+operations&rft.au=Kalles%2C+Dimitris&rft.au=Verykios%2C+Vassilios+S.&rft.au=Papagelis%2C+Athanasios&rft.date=2015-07-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FIISA.2015.7387954&rft.externalDocID=7387954