Now showing items 1-20 of 32

    • 2nd IEEE international workshop on Privacy Aspects of Data Mining (PADM 2010) 

      Gkoulalas-Divanis, A.; Liu, K.; Verykios, V. S.; Wolff, R. (2010)
    • Concealing the position of individuals in location-based services 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2011)
      The offering of location based services requires an in- depth knowledge of the subscriber's whereabouts. Thus, without the existence of strict safeguards, the deployment of such services may easily breach user privacy. To ...
    • A data perturbation approach to sensitive classification rule hiding 

      Delis, A.; Verykios, V. S.; Tsitsonis, A. A. (2010)
      This paper focuses on privacy preservation in classification rule mining. The subject at hand is approached through the proposition of a data perturbation approach for hiding sensitive classification rules in categorical ...
    • Duplicate record detection: A survey 

      Elmagarmid, A. K.; Ipeirotis, P. G.; Verykios, V. S. (2007)
      Often, in the real world, entities have two or more representations in databases. Duplicate records do not share a common key and/or they contain errors that make duplicate matching a difficult task. Errors are introduced ...
    • Efficient algorithms for distortion and blocking techniques in association rule hiding 

      Verykios, V. S.; Pontikakis, E. D.; Theodoridis, Y.; Chang, L. (2007)
      Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, ...
    • EXACT KNOWLEDGE HIDING IN TRANSACTIONAL DATABASES 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2009)
      The hiding of sensitive knowledge in the form of frequent itemsets, has gained increasing attention over the past years. This paper highlights the process of border revision, which is essential for the identification of ...
    • Exact Knowledge Hiding through Database Extension 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2009)
      In this paper, we propose a novel, exact border-based approach that provides an optimal solution for the hiding of sensitive frequent item sets by 1) minimally extending the original database by a synthetically generated ...
    • Fake injection strategies for private phonetic matching 

      Karakasidis, A.; Verykios, V. S.; Christen, P. (2012)
      In many aspects of everyday life, from education to health care and from economics to homeland security, information exchange involving companies or government agencies has become a common application. Locating the same ...
    • A free terrain model for trajectory k-anonymity 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2008)
      This paper introduces a privacy model for location based services that utilizes collected movement data to identify parts of the user trajectories, where user privacy is at an elevated risk. To protect the privacy of the ...
    • A generalized cost optimal decision model for record matching 

      Verykios, V. S.; Moustakides, G. V. (2004)
      Record (or entity) matching or linkage is the process of identifying records in one or more data sources, that refer to the same real world entity or object. In record linkage, the ultimate goal of a decision model is to ...
    • Hestia: Historically-enabled spatio-temporal information anonymity 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2010)
      Location-Based Services (LBSs) have long been established in several regions of the world to allow mobile users, equipped with positioning devices, access a set of spatially aware services. In this chapter, we introduce a ...
    • Hiding sensitive knowledge without side effects 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2009)
      Sensitive knowledge hiding in large transactional databases is one of the major goals of privacy preserving data mining. However, it is only recently that researchers were able to identify exact solutions for the hiding ...
    • A hybrid approach to frequent itemset hiding 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2007)
      In this paper, we propose a novel, exact border-based approach that provides an optimal solution for the hiding of sensitive frequent itemsets by (i) minimally extending the original database by a synthetically generated ...
    • Identifying unsafe routes for network-based trajectory privacy 

      Gkoulalas-Divanis, A.; Verykios, V. S.; Mokbel, M. F. (2009)
      In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. The privacy model has been implemented as ...
    • An integer programming approach for frequent itemset hiding 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2006)
      The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive knowledge from being exposed in patterns ...
    • A k-anonymity model for spatio-temporal data 

      Zacharouli, P.; Gkoulalas-Divanis, A.; Verykios, V. S. (2007)
      The unprecedented growth In Location-Based Services (LBS) take-up along with the continuously increasing storage capabilities of modern systems, and have facilitated the collection of information related to users activities ...
    • A max-min approach for hiding frequent itemsets 

      Moustakides, G. V.; Verykios, V. S. (2006)
      In this paper we are proposing a new algorithmic approach for sanitizing raw data from sensitive knowledge in the context of mining of association rules. The new approach (a) relies on the maxmin criterion which is a method ...
    • A MaxMin approach for hiding frequent itemsets 

      Moustakides, G. V.; Verykios, V. S. (2008)
      In this paper, we are proposing a new algorithmic approach for sanitizing raw data from sensitive knowledge in the context of mining of association rules. The new approach (a) relies on the maxmin criterion which is a ...
    • A network aware privacy model for online requests in trajectory data 

      Gkoulalas-Divanis, A.; Verykios, V. S.; Bozanis, P. (2009)
      In this work, we propose a privacy model for online user requests on trajectory data in location based services by utilizing an underlying network of user movement. The privacy model has been implemented as a framework ...
    • Optimal stopping: A record-linkage approach 

      Moustakides, G. V.; Verykios, V. S. (2009)
      Record-linkage is the process of identifying whether two separate records refer to the same real-world entity when some elements of the records identifying information (attributes) agree and others disagree. Existing ...