Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/6750
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbul, Osman-
dc.contributor.authorGökçe, Harun-
dc.contributor.authorSengez, Yağmur-
dc.date.accessioned2021-09-11T15:43:25Z-
dc.date.available2021-09-11T15:43:25Z-
dc.date.issued2009en_US
dc.identifier.citation24th International Symposium on Computer and Information Sciences -- SEP 14-16, 2009 -- Guzelyurt, CYPRUSen_US
dc.identifier.isbn978-1-4244-5021-3-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/6750-
dc.description.abstractSensitive knowledge hiding is an essential requirement to prevent disclosure of any sensitive knowledge holding in shared databases. The security of a database may be risked when it is made public as is: because the data mining tools are so sophisticated that the sensitive knowledge can easily be surfaced by receivers. This gives rise to a sanitization process which transforms the original database into another database, the released one, which does not hold the sensitive knowledge but can substitute the original otherwise. In case the sensitive knowledge is of the form frequent itemsets, the resulting concrete problem is called frequent itemsets hiding. A number of algorithms, exploiting different approaches and techniques, for frequent itemsets hiding problem is proposed in the literature. Since finding optimal solutions is NP-Hard, algorithms resort to certain heuristics having different levels of sophistication, complexity, efficiency and effectiveness. This paper presents an evaluation framework which implements recent algorithms belonging to different approaches and a set of metrics to gauge the performance and problem difficulties. The current work also presents an experimental study and its results where four algorithms and seven datasets are involved. Our results indicate that data distortion levels and runtime requirements are quite high, especially for difficult problem instances. Our conclusion is that there are new rooms for more sophisticated and tuneable (w.r.t. effectiveness/efficiency tradeoff) algorithms.en_US
dc.description.sponsorshipMiddle E Tech Univen_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartof2009 24Th International Symposium On Computer And Information Sciencesen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subject[No Keywords]en_US
dc.titleFrequent Itemsets Hiding: A Performance Evaluation Frameworken_US
dc.typeConference Objecten_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.startpage666en_US
dc.identifier.endpage671en_US
dc.identifier.wosWOS:000275024200118en_US
dc.identifier.scopus2-s2.0-73949130999en_US
dc.institutionauthorAbul, Osman-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.relation.conference24th International Symposium on Computer and Information Sciencesen_US
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.grantfulltextnone-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

32
checked on Apr 22, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.