Parcourir par auteur "Verykios, V. S."
Voici les éléments 1-20 de 32
-
2nd IEEE international workshop on Privacy Aspects of Data Mining (PADM 2010)
Gkoulalas-Divanis, A.; Liu, K.; Verykios, V. S.; Wolff, R. (2010) -
Concealing the position of individuals in location-based services
Gkoulalas-Divanis, A.; Verykios, V. S. (2011)The offering of location based services requires an in- depth knowledge of the subscriber's whereabouts. Thus, without the existence of strict safeguards, the deployment of such services may easily breach user privacy. To ... -
A data perturbation approach to sensitive classification rule hiding
Delis, A.; Verykios, V. S.; Tsitsonis, A. A. (2010)This paper focuses on privacy preservation in classification rule mining. The subject at hand is approached through the proposition of a data perturbation approach for hiding sensitive classification rules in categorical ... -
Duplicate record detection: A survey
Elmagarmid, A. K.; Ipeirotis, P. G.; Verykios, V. S. (2007)Often, in the real world, entities have two or more representations in databases. Duplicate records do not share a common key and/or they contain errors that make duplicate matching a difficult task. Errors are introduced ... -
Efficient algorithms for distortion and blocking techniques in association rule hiding
Verykios, V. S.; Pontikakis, E. D.; Theodoridis, Y.; Chang, L. (2007)Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, ... -
EXACT KNOWLEDGE HIDING IN TRANSACTIONAL DATABASES
Gkoulalas-Divanis, A.; Verykios, V. S. (2009)The hiding of sensitive knowledge in the form of frequent itemsets, has gained increasing attention over the past years. This paper highlights the process of border revision, which is essential for the identification of ... -
Exact Knowledge Hiding through Database Extension
Gkoulalas-Divanis, A.; Verykios, V. S. (2009)In this paper, we propose a novel, exact border-based approach that provides an optimal solution for the hiding of sensitive frequent item sets by 1) minimally extending the original database by a synthetically generated ... -
Fake injection strategies for private phonetic matching
Karakasidis, A.; Verykios, V. S.; Christen, P. (2012)In many aspects of everyday life, from education to health care and from economics to homeland security, information exchange involving companies or government agencies has become a common application. Locating the same ... -
A free terrain model for trajectory k-anonymity
Gkoulalas-Divanis, A.; Verykios, V. S. (2008)This paper introduces a privacy model for location based services that utilizes collected movement data to identify parts of the user trajectories, where user privacy is at an elevated risk. To protect the privacy of the ... -
A generalized cost optimal decision model for record matching
Verykios, V. S.; Moustakides, G. V. (2004)Record (or entity) matching or linkage is the process of identifying records in one or more data sources, that refer to the same real world entity or object. In record linkage, the ultimate goal of a decision model is to ... -
Hestia: Historically-enabled spatio-temporal information anonymity
Gkoulalas-Divanis, A.; Verykios, V. S. (2010)Location-Based Services (LBSs) have long been established in several regions of the world to allow mobile users, equipped with positioning devices, access a set of spatially aware services. In this chapter, we introduce a ... -
Hiding sensitive knowledge without side effects
Gkoulalas-Divanis, A.; Verykios, V. S. (2009)Sensitive knowledge hiding in large transactional databases is one of the major goals of privacy preserving data mining. However, it is only recently that researchers were able to identify exact solutions for the hiding ... -
A hybrid approach to frequent itemset hiding
Gkoulalas-Divanis, A.; Verykios, V. S. (2007)In this paper, we propose a novel, exact border-based approach that provides an optimal solution for the hiding of sensitive frequent itemsets by (i) minimally extending the original database by a synthetically generated ... -
Identifying unsafe routes for network-based trajectory privacy
Gkoulalas-Divanis, A.; Verykios, V. S.; Mokbel, M. F. (2009)In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. The privacy model has been implemented as ... -
An integer programming approach for frequent itemset hiding
Gkoulalas-Divanis, A.; Verykios, V. S. (2006)The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive knowledge from being exposed in patterns ... -
A k-anonymity model for spatio-temporal data
Zacharouli, P.; Gkoulalas-Divanis, A.; Verykios, V. S. (2007)The unprecedented growth In Location-Based Services (LBS) take-up along with the continuously increasing storage capabilities of modern systems, and have facilitated the collection of information related to users activities ... -
A max-min approach for hiding frequent itemsets
Moustakides, G. V.; Verykios, V. S. (2006)In this paper we are proposing a new algorithmic approach for sanitizing raw data from sensitive knowledge in the context of mining of association rules. The new approach (a) relies on the maxmin criterion which is a method ... -
A MaxMin approach for hiding frequent itemsets
Moustakides, G. V.; Verykios, V. S. (2008)In this paper, we are proposing a new algorithmic approach for sanitizing raw data from sensitive knowledge in the context of mining of association rules. The new approach (a) relies on the maxmin criterion which is a ... -
A network aware privacy model for online requests in trajectory data
Gkoulalas-Divanis, A.; Verykios, V. S.; Bozanis, P. (2009)In this work, we propose a privacy model for online user requests on trajectory data in location based services by utilizing an underlying network of user movement. The privacy model has been implemented as a framework ... -
Optimal stopping: A record-linkage approach
Moustakides, G. V.; Verykios, V. S. (2009)Record-linkage is the process of identifying whether two separate records refer to the same real-world entity when some elements of the records identifying information (attributes) agree and others disagree. Existing ...