Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/9873
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yıldız, Barış | - |
dc.contributor.author | Ergenç, Belgin | - |
dc.date.accessioned | 2021-01-24T18:28:53Z | - |
dc.date.available | 2021-01-24T18:28:53Z | - |
dc.date.issued | 2012 | - |
dc.identifier.isbn | 978-146141694-4 | - |
dc.identifier.issn | 1876-1100 | - |
dc.identifier.uri | https://doi.org/10.1007/978-1-4614-1695-1_19 | - |
dc.identifier.uri | https://hdl.handle.net/11147/9873 | - |
dc.description.abstract | In this work, we propose an integrated itemset hiding algorithm that eliminates the need of pre-mining and post-mining and uses a simple heuristic in selecting the itemset and the item in itemset for distortion. Base algorithm (matrix-apriori) works without candidate generation so efficiency is increased. Performance evaluation demonstrates (1) the side effect (lost itemsets) and time while increasing the number of sensitive itemsets and support of itemset and (2) speed up by integrating the post mining. © 2012 Springer Science+Business Media, LLC. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartof | Lecture Notes in Electrical Engineering | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Matrix-apriori | en_US |
dc.subject | Privacy preserving data mining | en_US |
dc.subject | Sensitive itemset hiding | en_US |
dc.title | Integrated approach for privacy preserving itemset mining | en_US |
dc.type | Conference Object | en_US |
dc.institutionauthor | Yıldız, Barış | - |
dc.institutionauthor | Ergenç, Belgin | - |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.volume | 110 LNEE | en_US |
dc.identifier.startpage | 247 | en_US |
dc.identifier.endpage | 260 | en_US |
dc.identifier.scopus | 2-s2.0-84855713997 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1007/978-1-4614-1695-1_19 | - |
dc.relation.doi | 10.1007/978-1-4614-1695-1_19 | en_US |
dc.coverage.doi | 10.1007/978-1-4614-1695-1_19 | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | Q4 | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | open | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
10.1007@978-1-4614-1695-119.pdf | 328.83 kB | Adobe PDF | View/Open |
CORE Recommender
SCOPUSTM
Citations
3
checked on Nov 29, 2024
Page view(s)
146
checked on Dec 2, 2024
Download(s)
126
checked on Dec 2, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.