Hiding decision tree rules by data set operations
This paper focuses on preserving the privacy of sensitive patterns in the context of inducing decision trees. The subject at hand is approached through a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuri...
Saved in:
Published in | 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA) pp. 1 - 6 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.07.2015
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/IISA.2015.7387954 |
Cover
Abstract | This paper focuses on preserving the privacy of sensitive patterns in the context of inducing decision trees. The subject at hand is approached through a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuristic solutions like output perturbation or cryptographic techniques - that restrict the usability of the data in different ways - since the raw data itself is readily available for public use. This methodology is based upon the unique characteristics of the induction of binary decision trees with binary-valued symbolic attributes and binary classes. |
---|---|
AbstractList | This paper focuses on preserving the privacy of sensitive patterns in the context of inducing decision trees. The subject at hand is approached through a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuristic solutions like output perturbation or cryptographic techniques - that restrict the usability of the data in different ways - since the raw data itself is readily available for public use. This methodology is based upon the unique characteristics of the induction of binary decision trees with binary-valued symbolic attributes and binary classes. |
Author | Kalles, Dimitris Papagelis, Athanasios Verykios, Vassilios S. |
Author_xml | – sequence: 1 givenname: Dimitris surname: Kalles fullname: Kalles, Dimitris email: kalles@eap.gr organization: Sch. of Sci. & Technol., Hellenic Open Univ., Patras, Greece – sequence: 2 givenname: Vassilios S. surname: Verykios fullname: Verykios, Vassilios S. email: verykios@eap.gr organization: Sch. of Sci. & Technol., Hellenic Open Univ., Patras, Greece – sequence: 3 givenname: Athanasios surname: Papagelis fullname: Papagelis, Athanasios email: papagel@efrontlearning.net organization: Epignosis Ltd., Athens, Greece |
BookMark | eNotj8tKAzEUQCPYhdZ-gLjJD8yYm5vmsSxF7UDBhXZd8rgjgTpTkrjo3yvY1dkcDpx7djvNEzH2CKIHEO55GD42vRSw7g1a49bqhq2csaC0QYcA7o7BLqc8ffFEMdc8T7wVIl5-TlR5uPDkm-eVGp_PVHz7E-oDW4z-VGl15ZIdXl8-t7tu__42bDf7LoPE1kXtg1LKapIJ7Ri9UcrEkBCiliKEpIST4BCt1SGNowtSG2m8R9Q6KINL9vTfzUR0PJf87cvleB3BXxnCQMo |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/IISA.2015.7387954 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781467393119 1467393118 |
EndPage | 6 |
ExternalDocumentID | 7387954 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i123t-c6ab44486e2d38fca7447cbd31c620bbd40921933886bdff9b26727aa3366b473 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:36:04 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i123t-c6ab44486e2d38fca7447cbd31c620bbd40921933886bdff9b26727aa3366b473 |
PageCount | 6 |
ParticipantIDs | ieee_primary_7387954 |
PublicationCentury | 2000 |
PublicationDate | 20150701 |
PublicationDateYYYYMMDD | 2015-07-01 |
PublicationDate_xml | – month: 07 year: 2015 text: 20150701 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA) |
PublicationTitleAbbrev | IISA |
PublicationYear | 2015 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.5848645 |
Snippet | This paper focuses on preserving the privacy of sensitive patterns in the context of inducing decision trees. The subject at hand is approached through a... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Classification algorithms Cryptography Data privacy decision tree Decision trees Entropy information gain rule hiding Yttrium |
Title | Hiding decision tree rules by data set operations |
URI | https://ieeexplore.ieee.org/document/7387954 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB3anjyptOI3e_Bo0iS7yWaPIpZWqAha6K1kdydQlLS0yaH-emeTWFE8eNssIcnshLy8nTczADf0j2zTRAtPpko6gqI8FVvhpYTtsUqzLKiJ4vQpGc_E4zyed-B2nwuDiLX4DH03rGP5dmUqt1U2lNy1xhZd6NJr1uRqtYHKMFDDyeTlzmm1Yr8970fDlBovRocw_bpTIxN586tS--bjVxHG_z7KEQy-M_PY8x5zjqGDRR_C8dIdMdv2y2Eu0sw21Ttumd4xJwJlWyzZao2Nv7cDmI0eXu_HXtsKwVsStJSeSTItiEklGFme5iaTQkijLQ9NEgVaW6Jp9O0hvkkLb_Nc6ciFWLOM84Q8IfkJ9IpVgafAchPYPMy51AFd0BUg4kTKhJSBQmEwOoO-M3exbqpdLFpLz_-evoADt-SNgPUSeuWmwiuC6VJf1_75BJlpkhc |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedCTyib-NgePtmubtGmOIo5OtyG4wW6j-VEYyjq29qB_vS9tnSgevCWhpEke9OuX9733AG7wH1nHkWQOjwW3BEU4ItTMiRHbQxGnqVcRxdE4SqbscRbOWnC7jYUxxlTiM-PaZuXL17kq7VVZj1NbGpvtwC7iPgvraK3GVel7ojcYvNxZtVboNk_-KJlSIUb_AEZf76qFIq9uWUhXffxKw_jfxRxC9zs2jzxvUecIWmbZAT9Z2B7RTcUcYn3NZF2-mQ2R78TKQMnGFCRfmdrimy5M-w-T-8RpiiE4CwSXwlFRKhlyqcgEmsaZSjljXElNfRUFnpQaiRp-fZBx4tHrLBMysE7WNKU0QltwegztZb40J0Ay5enMzyiXHk5oUxBRpGWMc08YpkxwCh273fmqzncxb3Z69vfwNewlk9FwPhyMn85h3x5_LWe9gHaxLs0lgnYhrypbfQJy-pVk |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+6th+International+Conference+on+Information%2C+Intelligence%2C+Systems+and+Applications+%28IISA%29&rft.atitle=Hiding+decision+tree+rules+by+data+set+operations&rft.au=Kalles%2C+Dimitris&rft.au=Verykios%2C+Vassilios+S.&rft.au=Papagelis%2C+Athanasios&rft.date=2015-07-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FIISA.2015.7387954&rft.externalDocID=7387954 |