Proceedings of the 10th Hellenic Conference on Artificial Intelligence 2018
DOI: 10.1145/3200947.3201030
|View full text |Cite
|
Sign up to set email alerts
|

On Using Linear Diophantine Equations for Efficient Hiding of Decision Tree Rules

Abstract: This paper focuses on preserving the privacy of sensitive patterns when inducing decision trees. We adopt a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuristic solutions like output perturbation or cryptographic techniques -which restrict the usability of the datasince the raw data itself is readily available for public use. In this paper, we propose a look ahead approach using linear Diophantine equations in ord… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…The first one is that we do not need to add new instances to the original data set, and the second is that our new heuristic can be performed in only one step with much lower computational complexity compared to solving systems of Linear Diophantine Equations. However, our previous published techniques [ 20 , 21 ] guarantee the preservation of entropy values in every node of the tree before and after the modification.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The first one is that we do not need to add new instances to the original data set, and the second is that our new heuristic can be performed in only one step with much lower computational complexity compared to solving systems of Linear Diophantine Equations. However, our previous published techniques [ 20 , 21 ] guarantee the preservation of entropy values in every node of the tree before and after the modification.…”
Section: Discussionmentioning
confidence: 99%
“…This approach is critical because the sanitized data set may be subsequently published and even shared with the data set owner’s competitors, as can be the case with retail banking [ 19 ]. We extend this work in the papers [ 20 , 21 ] by formulating a generic look ahead technique that considers the structure of the decision tree from an affected leaf to the root. The main contribution of these publications was to improve the Swap-and-Add pass by following a look ahead approach instead of the greedy approach which was previously used.…”
Section: Introductionmentioning
confidence: 99%
“…That is, we can obtain two integer solutions of the equation (1.1) , such as (x, y, z, l) = (9, 4, 4, 2), (6,5,4,2).…”
Section: Introductionmentioning
confidence: 99%
“…In articles [5][6][7][8], the authors proposed a series of strategies that would effectively protect against the disclosure of the sensitive classification rules. The LDH algorithm [9] was developed on the basis of the concept of preserving sensitive DT rules resulting from the use of data mining techniques.…”
Section: Introductionmentioning
confidence: 99%