G. Feretzakis, Dimitris Kalles, Vassilios S. Verykios
{"title":"金融技术应用中的局部失真隐藏:基于基准数据集的案例研究","authors":"G. Feretzakis, Dimitris Kalles, Vassilios S. Verykios","doi":"10.1109/IISA.2019.8900733","DOIUrl":null,"url":null,"abstract":"Data sharing has become an increasingly common procedure among financial institutions, but any organisation will most probably attempt to conceal some critical rules before exchange their information with others. This paper concentrates on protecting sensitive rules when we assume that binary decision trees will be the models to be induced by the shared data. The suggested heuristic hiding technique is preferred over other heuristic solutions such as output disturbance or encryption methods that restrict data usability, as the raw data itself can then more easily be offered for access by any third parties. In this article, we present a paradigm of using the Local Distortion Hiding (LDH) algorithm in a real-life financial data set to hide a sensitive rule.","PeriodicalId":371385,"journal":{"name":"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Local Distortion Hiding in Financial Technology application: a case study with a benchmark data set\",\"authors\":\"G. Feretzakis, Dimitris Kalles, Vassilios S. Verykios\",\"doi\":\"10.1109/IISA.2019.8900733\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data sharing has become an increasingly common procedure among financial institutions, but any organisation will most probably attempt to conceal some critical rules before exchange their information with others. This paper concentrates on protecting sensitive rules when we assume that binary decision trees will be the models to be induced by the shared data. The suggested heuristic hiding technique is preferred over other heuristic solutions such as output disturbance or encryption methods that restrict data usability, as the raw data itself can then more easily be offered for access by any third parties. In this article, we present a paradigm of using the Local Distortion Hiding (LDH) algorithm in a real-life financial data set to hide a sensitive rule.\",\"PeriodicalId\":371385,\"journal\":{\"name\":\"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IISA.2019.8900733\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IISA.2019.8900733","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Local Distortion Hiding in Financial Technology application: a case study with a benchmark data set
Data sharing has become an increasingly common procedure among financial institutions, but any organisation will most probably attempt to conceal some critical rules before exchange their information with others. This paper concentrates on protecting sensitive rules when we assume that binary decision trees will be the models to be induced by the shared data. The suggested heuristic hiding technique is preferred over other heuristic solutions such as output disturbance or encryption methods that restrict data usability, as the raw data itself can then more easily be offered for access by any third parties. In this article, we present a paradigm of using the Local Distortion Hiding (LDH) algorithm in a real-life financial data set to hide a sensitive rule.