{"id":"https://openalex.org/W4254902029","doi":"https://doi.org/10.1145/1980022.1980382","title":"Measuring side effects of rule hiding","display_name":"Measuring side effects of rule hiding","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W4254902029","doi":"https://doi.org/10.1145/1980022.1980382"},"language":"en","primary_location":{"id":"doi:10.1145/1980022.1980382","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980382","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037368119","display_name":"S. Rahul Jinturkar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. Rahul Jinturkar","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073199473","display_name":"Seema Kolkur","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Seema Kolkur","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037368119"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43802336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1371","last_page":"1371"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9365000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7708022594451904},{"id":"https://openalex.org/keywords/spurious-relationship","display_name":"Spurious relationship","score":0.6693901419639587},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.662996768951416},{"id":"https://openalex.org/keywords/association-rule-learning","display_name":"Association rule learning","score":0.6158283948898315},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5699552893638611},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4608343243598938},{"id":"https://openalex.org/keywords/limit","display_name":"Limit (mathematics)","score":0.4593740701675415},{"id":"https://openalex.org/keywords/term","display_name":"Term (time)","score":0.4544461667537689},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4394080936908722},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.4381319582462311},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37544459104537964},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.37160933017730713},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.16943269968032837}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7708022594451904},{"id":"https://openalex.org/C97256817","wikidata":"https://www.wikidata.org/wiki/Q1462316","display_name":"Spurious relationship","level":2,"score":0.6693901419639587},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.662996768951416},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.6158283948898315},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5699552893638611},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4608343243598938},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.4593740701675415},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.4544461667537689},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4394080936908722},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.4381319582462311},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37544459104537964},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.37160933017730713},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.16943269968032837},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1980022.1980382","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980382","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2113309085","https://openalex.org/W2410549043","https://openalex.org/W3014936414","https://openalex.org/W2394010168","https://openalex.org/W2993700121","https://openalex.org/W2184109998","https://openalex.org/W2362772308","https://openalex.org/W1966332270","https://openalex.org/W2592346263","https://openalex.org/W1986284674"],"abstract_inverted_index":{"Data":[0],"mining":[1,67],"techniques":[2,15],"have":[3,72],"been":[4,47],"widely":[5],"used":[6],"in":[7,65,97,139],"various":[8],"applications.":[9],"However,":[10],"the":[11,19,41,52,59,74,109,126,130,144,149,157,168,172],"misuse":[12],"of":[13,21,26,40,43,105,133,170],"these":[14],"may":[16,79],"lead":[17],"to":[18,84,100,117,124],"disclosure":[20,75],"sensitive":[22,29,106,127,146],"information.":[23],"Large":[24],"repositories":[25],"data":[27,66,83],"contain":[28],"information":[30,45],"that":[31,77,93],"must":[32],"be":[33],"protected":[34],"against":[35],"unauthorized":[36],"access.":[37],"The":[38,136],"protection":[39],"confidentiality":[42],"this":[44,88,119,140],"has":[46],"a":[48],"long-term":[49],"goal":[50],"for":[51,58,174],"database":[53,99,159],"security":[54],"research":[55],"community":[56],"and":[57,68,160,166,179],"government":[60],"statistical":[61],"agencies.":[62],"Recent":[63],"advances":[64],"machine":[69],"learning":[70],"algorithms":[71],"increased":[73],"risks":[76],"one":[78],"encounter":[80],"when":[81],"releasing":[82],"outside":[85],"parties.":[86],"In":[87],"paper,":[89],"we":[90,121],"present":[91],"approach":[92],"modifies":[94],"few":[95],"transactions":[96],"transaction":[98],"decrease":[101],"support":[102,176],"or":[103],"confidence":[104,181],"rules.":[107],"Since":[108],"correlation":[110],"among":[111],"rules":[112,128,155,162],"can":[113],"make":[114],"it":[115],"impossible":[116],"achieve":[118],"goal,":[120],"suggest":[122],"method":[123,137],"hide":[125],"with":[129],"reduced":[131],"number":[132],"modified":[134],"entries.":[135],"presented":[138],"paper":[141],"hides":[142],"all":[143,171],"selected":[145],"rules,":[147],"limit":[148],"side":[150],"effects":[151],"i.":[152],"e.":[153],"lost":[154],"from":[156],"original":[158],"spurious":[161],"(new":[163],"rules)":[164],"generated":[165],"measures":[167],"count":[169],"constraints":[173],"minimum":[175,180],"threshold":[177,182],"(MST)":[178],"(MCT)":[183],"value":[184],"sets.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
