2013 IEEE 13th International Conference on Data Mining 2013
DOI: 10.1109/icdm.2013.57
|View full text |Cite
|
Sign up to set email alerts
|

Permutation-Based Sequential Pattern Hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 12 publications
(32 citation statements)
references
References 14 publications
0
32
0
Order By: Relevance
“…Thus, fewer ghosts imply that data utility is higher. The notion of ghost events appears in [14] but here we adapt it to event sequences.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…Thus, fewer ghosts imply that data utility is higher. The notion of ghost events appears in [14] but here we adapt it to event sequences.…”
Section: Methodsmentioning
confidence: 99%
“…Note that we treat sensitive events as not exposed, when their relative frequency is lower than δ. This approach aims to minimize the impact of deletion on data utility and is adopted by most sanitization methods [23,3,11,14,24,19]. It makes the reasonable assumption that sensitive knowledge is not actionable, when it is mined at a lower threshold than δ.…”
Section: Problem (Event Sequence Sanitization (Ess))mentioning
confidence: 99%
See 3 more Smart Citations