Applications of Assoiation Rules Hiding Heuristic Approaches
dc.authorid | Karci, Ali/0000-0002-8489-8617 | |
dc.authorwosid | KARCI, Ali/A-9604-2019 | |
dc.authorwosid | Karci, Ali/AAG-5337-2019 | |
dc.contributor.author | Farea, Afrah | |
dc.contributor.author | Karci, Ali | |
dc.date.accessioned | 2024-08-04T20:41:07Z | |
dc.date.available | 2024-08-04T20:41:07Z | |
dc.date.issued | 2015 | |
dc.department | İnönü Üniversitesi | en_US |
dc.description | 23nd Signal Processing and Communications Applications Conference (SIU) -- MAY 16-19, 2015 -- Inonu Univ, Malatya, TURKEY | en_US |
dc.description.abstract | Data Mining allows large database owners to extract useful knowledge that could not be deduced with traditional approaches like statistics. However, these sometimes reveal sensitive knowledge or preach individual privacies. The term sanitization is given to the process of changing original database into another one from which we can mine without exposing sensitive knowledge. In this paper, we give a detailed explanation of some heuristic approaches for this purpose. We applied them on a number of publically available datasets and examine the results. | en_US |
dc.description.sponsorship | Dept Comp Engn & Elect & Elect Engn,Elect & Elect Engn,Bilkent Univ | en_US |
dc.identifier.endpage | 2653 | en_US |
dc.identifier.isbn | 978-1-4673-7386-9 | |
dc.identifier.issn | 2165-0608 | |
dc.identifier.scopus | 2-s2.0-84939130129 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.startpage | 2650 | en_US |
dc.identifier.uri | https://hdl.handle.net/11616/96902 | |
dc.identifier.wos | WOS:000380500900648 | en_US |
dc.identifier.wosquality | N/A | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | Ieee | en_US |
dc.relation.ispartof | 2015 23rd Signal Processing and Communications Applications Conference (Siu) | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | transaction | en_US |
dc.subject | support | en_US |
dc.subject | confidence | en_US |
dc.subject | sanitization | en_US |
dc.subject | itemset | en_US |
dc.subject | frequent pattern | en_US |
dc.subject | association rule | en_US |
dc.subject | Data Mining | en_US |
dc.title | Applications of Assoiation Rules Hiding Heuristic Approaches | en_US |
dc.type | Conference Object | en_US |