Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/62150
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIslam, Md Zahidulen
dc.contributor.authorBrankovic, Ljiljanaen
dc.date.accessioned2024-08-13T03:57:57Z-
dc.date.available2024-08-13T03:57:57Z-
dc.date.issued2005-12-19-
dc.identifier.citationProceedings of the 3rd IEEE International Conference on Industrial Informatics, 2005 (INDIN '05), p. 701-708en
dc.identifier.isbn0-7803-9094-6en
dc.identifier.issn2378-363Xen
dc.identifier.issn1935-4576en
dc.identifier.urihttps://hdl.handle.net/1959.11/62150-
dc.description.abstract<p>Data mining is a powerful tool for information discovery from huge datasets. Various sectors, including commercial, government, financial, medical, and scientific, are applying data mining techniques on their datasets that typically contain sensitive individual information. During this process the datasets get exposed to several parties, which can potentially lead to disclosure of sensitive information and thus to breaches of privacy. Several data mining privacy preserving techniques have been recently proposed. In this paper we focus on data perturbation techniques, i.e., those that add noise to the data in order to prevent exact disclosure of confidential values. Some of these techniques were designed for datasets having only numerical non-class attributes and a categorical class attribute. However, natural datasets are more likely to have both numerical and categorical non-class attributes, and occasionally they contain only categorical attributes. Noise addition techniques developed for numerical attributes are not suitable for such datasets, due to the absence of natural ordering among categorical values. In this paper we propose a new method for adding noise to categorical values, which makes use of the clusters that exist among these values. We first discuss several existing categorical clustering methods and point out the limitations they exhibit in our context. Then we present a novel approach towards clustering of categorical values and use it to perturb data while maintaining the patterns in the dataset. Our clustering approach partitions the values of a given categorical attribute rather than the records of the datasets; additionally, our approach operates on the horizontally partitioned dataset and it is possible for two values to belong to the same cluster in one horizontal partition of the dataset, and to two distinct clusters in another partition. Finally, we provide some experimental results in order to evaluate our perturbation technique and to compare our clustering approach with an existing method, the so-called CACTUS.</p>en
dc.languageenen
dc.publisherIEEE Xploreen
dc.relation.ispartofProceedings of the 3rd IEEE International Conference on Industrial Informatics, 2005 (INDIN '05)en
dc.titleDETECTIVE: a decision tree based categorical value clustering and perturbation technique for preserving privacy in data miningen
dc.typeConference Publicationen
dc.relation.conferenceINDIN 2005: 3rd IEEE International Conference on Industrial Informatics (INDIN) Conferenceen
dc.identifier.doi10.1109/INDIN.2005.1560461en
local.contributor.firstnameMd Zahidulen
local.contributor.firstnameLjiljanaen
local.relation.isfundedbyARCen
local.profile.schoolSchool of Science and Technologyen
local.profile.emaillbrankov@une.edu.auen
local.output.categoryE1en
local.grant.numberDG-DP0452182en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.date.conference10th to 12th of August, 2005en
local.conference.placePerth, WA, Australiaen
local.publisher.placeUnited States of Americaen
local.format.startpage701en
local.format.endpage708en
local.peerreviewedYesen
local.title.subtitlea decision tree based categorical value clustering and perturbation technique for preserving privacy in data miningen
local.contributor.lastnameIslamen
local.contributor.lastnameBrankovicen
dc.identifier.staffune-id:lbrankoven
local.profile.orcid0000-0002-5056-4627en
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/62150en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitleDETECTIVEen
local.output.categorydescriptionE1 Refereed Scholarly Conference Publicationen
local.relation.grantdescriptionARC/DG-DP0452182en
local.conference.detailsINDIN 2005: 3rd IEEE International Conference on Industrial Informatics (INDIN) Conference, Perth, WA, Australia, 10th to 12th of August, 2005en
local.search.authorIslam, Md Zahidulen
local.search.authorBrankovic, Ljiljanaen
local.uneassociationNoen
local.atsiresearchNoen
local.sensitive.culturalNoen
local.year.published2005en
local.subject.for2020460402 Data and information privacyen
local.subject.seo2020220405 Cybersecurityen
local.date.start2005-08-10-
local.date.end2005-08-12-
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Conference Publication
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record

SCOPUSTM   
Citations

16
checked on Jan 11, 2025
Google Media

Google ScholarTM

Check

Altmetric


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.