{"id":"https://openalex.org/W2300782066","doi":"https://doi.org/10.1145/2888451.2888462","title":"Feature Creation based Slicing for Privacy Preserving Data Mining","display_name":"Feature Creation based Slicing for Privacy Preserving Data Mining","publication_year":2016,"publication_date":"2016-03-13","ids":{"openalex":"https://openalex.org/W2300782066","doi":"https://doi.org/10.1145/2888451.2888462","mag":"2300782066"},"language":"en","primary_location":{"id":"doi:10.1145/2888451.2888462","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2888451.2888462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd IKDD Conference on Data Science, 2016","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042546058","display_name":"R. Praveena Priyadarsini","orcid":null},"institutions":[{"id":"https://openalex.org/I161045824","display_name":"Avinashilingam University","ror":"https://ror.org/05dxzqa20","country_code":"IN","type":"education","lineage":["https://openalex.org/I161045824"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"R. Praveena Priyadarsini","raw_affiliation_strings":["Dept. of Computer Science &amp; Engg Avinashilingam University for Women, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science &amp; Engg Avinashilingam University for Women, Coimbatore, India","institution_ids":["https://openalex.org/I161045824"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057175589","display_name":"M. L. Valarmathi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"M. L. Valarmathi","raw_affiliation_strings":["Dept. of Computer Science &amp; Engg Government College of Technology, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science &amp; Engg Government College of Technology, Coimbatore, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036177246","display_name":"S. Sivakumari","orcid":null},"institutions":[{"id":"https://openalex.org/I161045824","display_name":"Avinashilingam University","ror":"https://ror.org/05dxzqa20","country_code":"IN","type":"education","lineage":["https://openalex.org/I161045824"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Sivakumari","raw_affiliation_strings":["Dept. of Computer Science &amp; Engg Avinashilingam University for Women, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science &amp; Engg Avinashilingam University for Women, Coimbatore, India","institution_ids":["https://openalex.org/I161045824"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042546058"],"corresponding_institution_ids":["https://openalex.org/I161045824"],"apc_list":null,"apc_paid":null,"fwci":0.857,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.82869662,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/slicing","display_name":"Slicing","score":0.8990265130996704},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7906249165534973},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.7140555381774902},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5232747793197632},{"id":"https://openalex.org/keywords/association-rule-learning","display_name":"Association rule learning","score":0.5194575190544128},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5048123598098755},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4848802983760834},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4341604709625244},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14194750785827637}],"concepts":[{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.8990265130996704},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7906249165534973},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.7140555381774902},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5232747793197632},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.5194575190544128},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5048123598098755},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4848802983760834},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4341604709625244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14194750785827637},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2888451.2888462","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2888451.2888462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd IKDD Conference on Data Science, 2016","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W109832452","https://openalex.org/W184146824","https://openalex.org/W1544579602","https://openalex.org/W1565377632","https://openalex.org/W1670263352","https://openalex.org/W1707548898","https://openalex.org/W1972289686","https://openalex.org/W1979005794","https://openalex.org/W2019376841","https://openalex.org/W2038261784","https://openalex.org/W2063811654","https://openalex.org/W2071776923","https://openalex.org/W2084012970","https://openalex.org/W2089808040","https://openalex.org/W2091095338","https://openalex.org/W2105564121","https://openalex.org/W2107927452","https://openalex.org/W2111272198","https://openalex.org/W2119047901","https://openalex.org/W2130099852","https://openalex.org/W2133990480","https://openalex.org/W2134167315","https://openalex.org/W2140190241","https://openalex.org/W2142406320","https://openalex.org/W2149706766","https://openalex.org/W2166825417","https://openalex.org/W2170247462","https://openalex.org/W2178073758","https://openalex.org/W2230048354","https://openalex.org/W2241103921","https://openalex.org/W2295256067","https://openalex.org/W2951017643","https://openalex.org/W2973651390","https://openalex.org/W3120740533","https://openalex.org/W6606910359","https://openalex.org/W6629264894"],"related_works":["https://openalex.org/W3128334246","https://openalex.org/W2592346263","https://openalex.org/W1966332270","https://openalex.org/W3154526749","https://openalex.org/W2083944649","https://openalex.org/W4309503015","https://openalex.org/W1982505993","https://openalex.org/W2596305496","https://openalex.org/W1548444773","https://openalex.org/W2577220285"],"abstract_inverted_index":{"In":[0],"the":[1,24,34,59,104,109,124,150,161,165],"digital":[2],"era":[3],"vast":[4],"amount":[5],"of":[6,14,36,61,76,164],"data":[7,19,37,54,62],"are":[8,55,95,106,158],"collected":[9],"and":[10,16,26,82,85,100,103,112,138,154],"shared":[11],"for":[12,48],"purpose":[13],"research":[15],"analysis.":[17],"These":[18],"contain":[20],"sensitive":[21,53,133],"information":[22],"about":[23],"people":[25],"organizations":[27],"which":[28],"needs":[29],"to":[30,145],"be":[31],"protected":[32],"during":[33,58,135,142],"process":[35,60,148],"mining.":[38],"This":[39],"work":[40],"proposes":[41],"Feature":[42],"Creation":[43],"Based":[44],"Slicing":[45],"[FCBS]":[46],"algorithm":[47,72,126],"preserving":[49],"privacy":[50,77,119,167],"such":[51],"that":[52,118,171],"not":[56],"exposed":[57],"mining":[63,137],"in":[64,149],"Multi":[65],"Trust":[66],"Level":[67],"[MTL]":[68],"environment.":[69],"The":[70,115],"proposed":[71,125,151,166],"applies":[73],"three":[74],"layers":[75],"preservation":[78],"using":[79,123],"both":[80],"perturbation":[81],"non-perturbation":[83],"techniques":[84],"creates":[86],"new":[87],"features":[88],"from":[89],"already":[90],"existing":[91,110],"attribute":[92],"vector.":[93],"Experiments":[94],"performed":[96],"on":[97],"real":[98],"life":[99],"benchmarked":[101],"datasets":[102,121,169],"results":[105,116],"compared":[107],"with":[108],"slicing":[111],"L-diversity":[113],"algorithms.":[114],"show":[117,170],"preserved":[120,168],"generated":[122],"yields":[127],"negligible":[128],"hiding":[129],"failure":[130],"while":[131],"protecting":[132],"patterns":[134],"association":[136],"gives":[139],"comparable":[140],"utility":[141],"classification.":[143],"Due":[144],"feature":[146],"creation":[147],"algorithm,":[152],"linking":[153],"known":[155],"background":[156],"attacks":[157],"prevented.":[159],"Also,":[160],"variance":[162],"values":[163],"they":[172],"can":[173],"prevent":[174],"diversity":[175],"attacks.":[176]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
