Document Concept Hierarchy Generation by Extracting Semantic Tree Using Knowledge Graph

Author(s):  
Sanjida Nasreen Tumpa ◽  
Muhammad Masroor Ali
2014 ◽  
Vol 13 (04) ◽  
pp. 1450035 ◽  
Author(s):  
Valli Kumari Vatsavayi ◽  
Sri Krishna Adusumalli

Explosive growth of information in the Internet has raised threats for individual privacy. k-Anonymity and l-diversity are two known techniques proposed to address the threats. They use concept hierarchy tree (CHT)-based generalization/suppression. For a given attribute several CHTs can be constructed. An appropriate CHT is to be chosen for attribute anonymization to be effective. This paper discusses an on the fly approach for constructing CHT which can be used for generalization/suppression. Furthermore to improve anonymization the CHT can be dynamically adjusted for a given k value. Performance evaluation is done for the proposed approach and a comparative study is performed against known methods, k-member clustering anonymization and mondrian multi-dimensional algorithm using (1) improved on the fly hierarchy (IOTF) (Campan et al., 2011), (2) on the fly hierarchy (OTF) (Campan and Cooper, 2010), (3) hierarchy free (HF) (LeFevre et al., 2006), (4) predefined hierarchy (PH) (Iyengar, 2002) (5) CHU (Chu and Chiang, 1994) and (6) HAN (Han and Fu, 1994) methods. The metrics used for evaluation are (a) information loss, (b) discernibility metric, (c) normalized average equivalence size metric. Experimental results indicate that our approach is more effective and flexible and the utility is 12% better than IOTF, 16% better than OTF and CHU, 17% better than PH and 21% better than HAN methods when applied on mondrain multi-dimensional algorithm. Experiments are conducted on k-member clustering technique and it is observed that our approach improved utility 1% better than IOTF, 2% better than OTF, 3% better than CHU, 5% better than PH and 14% better than HAN methods.


2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


2019 ◽  
Author(s):  
Jemmy Wiratama
Keyword(s):  

I'm an Science & Technology enthusiast. I still learn how to build a knowledge graph and how to write a paper.


Author(s):  
A-Yeong Kim ◽  
◽  
Hee-Guen Yoon ◽  
Seong-Bae Park ◽  
Se-Young Park ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document