Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/62150
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Islam, Md Zahidul | en |
dc.contributor.author | Brankovic, Ljiljana | en |
dc.date.accessioned | 2024-08-13T03:57:57Z | - |
dc.date.available | 2024-08-13T03:57:57Z | - |
dc.date.issued | 2005-12-19 | - |
dc.identifier.citation | Proceedings of the 3rd IEEE International Conference on Industrial Informatics, 2005 (INDIN '05), p. 701-708 | en |
dc.identifier.isbn | 0-7803-9094-6 | en |
dc.identifier.issn | 2378-363X | en |
dc.identifier.issn | 1935-4576 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/62150 | - |
dc.description.abstract | <p>Data mining is a powerful tool for information discovery from huge datasets. Various sectors, including commercial, government, financial, medical, and scientific, are applying data mining techniques on their datasets that typically contain sensitive individual information. During this process the datasets get exposed to several parties, which can potentially lead to disclosure of sensitive information and thus to breaches of privacy. Several data mining privacy preserving techniques have been recently proposed. In this paper we focus on data perturbation techniques, i.e., those that add noise to the data in order to prevent exact disclosure of confidential values. Some of these techniques were designed for datasets having only numerical non-class attributes and a categorical class attribute. However, natural datasets are more likely to have both numerical and categorical non-class attributes, and occasionally they contain only categorical attributes. Noise addition techniques developed for numerical attributes are not suitable for such datasets, due to the absence of natural ordering among categorical values. In this paper we propose a new method for adding noise to categorical values, which makes use of the clusters that exist among these values. We first discuss several existing categorical clustering methods and point out the limitations they exhibit in our context. Then we present a novel approach towards clustering of categorical values and use it to perturb data while maintaining the patterns in the dataset. Our clustering approach partitions the values of a given categorical attribute rather than the records of the datasets; additionally, our approach operates on the horizontally partitioned dataset and it is possible for two values to belong to the same cluster in one horizontal partition of the dataset, and to two distinct clusters in another partition. Finally, we provide some experimental results in order to evaluate our perturbation technique and to compare our clustering approach with an existing method, the so-called CACTUS.</p> | en |
dc.language | en | en |
dc.publisher | IEEE Xplore | en |
dc.relation.ispartof | Proceedings of the 3rd IEEE International Conference on Industrial Informatics, 2005 (INDIN '05) | en |
dc.title | DETECTIVE: a decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining | en |
dc.type | Conference Publication | en |
dc.relation.conference | INDIN 2005: 3rd IEEE International Conference on Industrial Informatics (INDIN) Conference | en |
dc.identifier.doi | 10.1109/INDIN.2005.1560461 | en |
local.contributor.firstname | Md Zahidul | en |
local.contributor.firstname | Ljiljana | en |
local.relation.isfundedby | ARC | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | E1 | en |
local.grant.number | DG-DP0452182 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.date.conference | 10th to 12th of August, 2005 | en |
local.conference.place | Perth, WA, Australia | en |
local.publisher.place | United States of America | en |
local.format.startpage | 701 | en |
local.format.endpage | 708 | en |
local.peerreviewed | Yes | en |
local.title.subtitle | a decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining | en |
local.contributor.lastname | Islam | en |
local.contributor.lastname | Brankovic | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/62150 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | DETECTIVE | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.relation.grantdescription | ARC/DG-DP0452182 | en |
local.conference.details | INDIN 2005: 3rd IEEE International Conference on Industrial Informatics (INDIN) Conference, Perth, WA, Australia, 10th to 12th of August, 2005 | en |
local.search.author | Islam, Md Zahidul | en |
local.search.author | Brankovic, Ljiljana | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2005 | en |
local.subject.for2020 | 460402 Data and information privacy | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.date.start | 2005-08-10 | - |
local.date.end | 2005-08-12 | - |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Conference Publication School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
SCOPUSTM
Citations
16
checked on Jan 11, 2025
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.