Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/6808
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Abul, Osman | - |
dc.contributor.author | Bonchi, Francesco | - |
dc.contributor.author | Giannotti, Fosca | - |
dc.date.accessioned | 2021-09-11T15:43:40Z | - |
dc.date.available | 2021-09-11T15:43:40Z | - |
dc.date.issued | 2010 | en_US |
dc.identifier.issn | 1041-4347 | - |
dc.identifier.issn | 1558-2191 | - |
dc.identifier.uri | https://doi.org/10.1109/TKDE.2009.213 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/6808 | - |
dc.description.abstract | The process of discovering relevant patterns holding in a database was first indicated as a threat to database security by O'Leary in [1]. Since then, many different approaches for knowledge hiding have emerged over the years, mainly in the context of association rules and frequent item sets mining. Following many real-world data and application demands, in this paper, we shift the problem of knowledge hiding to contexts where both the data and the extracted knowledge have a sequential structure. We define the problem of hiding sequential patterns and show its NP-hardness. Thus, we devise heuristics and a polynomial sanitization algorithm. Starting from this framework, we specialize it to the more complex case of spatiotemporal patterns extracted from moving objects databases. Finally, we discuss a possible kind of attack to our model, which exploits the knowledge of the underlying road network, and enhance our model to protect from this kind of attack. An exhaustive experiential analysis on real-world data sets shows the effectiveness of our proposal. | en_US |
dc.description.sponsorship | TUBITAKTurkiye Bilimsel ve Teknolojik Arastirma Kurumu (TUBITAK) [108E016] | en_US |
dc.description.sponsorship | The authors would like to thank Maurizio Atzori and Mirco Nanni for many fruitful discussions. Osman Abul is supported by TUBITAK under grant number 108E016. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE Computer Soc | en_US |
dc.relation.ispartof | IEEE Transactions On Knowledge And Data Engineering | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Sequential patterns | en_US |
dc.subject | spatiotemporal patterns | en_US |
dc.subject | knowledge hiding | en_US |
dc.subject | data publishing | en_US |
dc.title | Hiding Sequential and Spatiotemporal Patterns | en_US |
dc.type | Article | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.volume | 22 | en_US |
dc.identifier.issue | 12 | en_US |
dc.identifier.startpage | 1709 | en_US |
dc.identifier.endpage | 1723 | en_US |
dc.identifier.wos | WOS:000283133800005 | en_US |
dc.identifier.scopus | 2-s2.0-78149260852 | en_US |
dc.institutionauthor | Abul, Osman | - |
dc.identifier.doi | 10.1109/TKDE.2009.213 | - |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | Q1 | - |
item.openairetype | Article | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
29
checked on Dec 21, 2024
WEB OF SCIENCETM
Citations
22
checked on Oct 5, 2024
Page view(s)
96
checked on Dec 16, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.