2007
DOI: 10.1016/j.aei.2006.12.003
|View full text |Cite
|
Sign up to set email alerts
|

MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 22 publications
(31 reference statements)
0
10
0
Order By: Relevance
“…Aggregate, Hybrid and Disaggregate algorithms presented in [10] perform better than the SWA algorithm [9] in terms of data utility but suffers from computational complexity. Item grouping algorithm (IGA) presented in [8] is improved in [11] to decrease the number of modifications. Hong et al in [12] proposed a greedy SIF-IDF algorithm that uses TF-IDF measure from information retrieval to compute the correspondence between sensitive itemsets and transactions.…”
Section: Related Workmentioning
confidence: 99%
“…Aggregate, Hybrid and Disaggregate algorithms presented in [10] perform better than the SWA algorithm [9] in terms of data utility but suffers from computational complexity. Item grouping algorithm (IGA) presented in [8] is improved in [11] to decrease the number of modifications. Hong et al in [12] proposed a greedy SIF-IDF algorithm that uses TF-IDF measure from information retrieval to compute the correspondence between sensitive itemsets and transactions.…”
Section: Related Workmentioning
confidence: 99%
“…Three side effects in PPDM, including hiding failures (HF), missing cost (MC) and artificial cost (AC) are presented. Most researchers [16], [18], [44], [47], [48], [50], [53] adopt these three side effects to measure the performance of their proposed algorithms. Hiding failure means some information has not been hidden completely after the sanitization process.…”
Section: B Privacy-preserving Utility Miningmentioning
confidence: 99%
“…Since sensitive itemset usually contains more than one item, Li et al proposed the MICF (maximum item conflict first) [47] algorithm to hide sensitive patterns. MICF uses the maximum item which appears in sensitive itemsets as the target item in each step.…”
Section: B Privacy Preserving Utility Miningmentioning
confidence: 99%
“…Data sanitization in the IGA is based on the degree of sensitive transactions. 35 The maximum item conflict first (MICF) 37 is an itemset-based and multiple-ruleshiding algorithm. This algorithm is intended to overcome the overlap problem in the IGA 36 and decrease the number of deleted items.…”
Section: Heuristic Distortion-based Approachesmentioning
confidence: 99%