Sensitive association rules hiding using electromagnetic field optimization algorithm
暂无分享,去创建一个
[1] Aris Gkoulalas-Divanis,et al. A Survey of Association Rule Hiding Methods for Privacy , 2008, Privacy-Preserving Data Mining.
[2] Michael J. A. Berry,et al. Data mining techniques - for marketing, sales, and customer support , 1997, Wiley computer publishing.
[3] Hossein Nouri,et al. A bacteria foraging algorithm based cell formation considering operation time , 2012 .
[4] Ayyaz Hussain,et al. Improved Genetic Algorithm Approach for Sensitive Association Rules Hiding , 2014 .
[5] Francisco Herrera,et al. A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms , 2011, Swarm Evol. Comput..
[6] Shuicheng Yan,et al. Correntropy based feature selection using binary projection , 2011, Pattern Recognit..
[7] Mahmoudi Shadi,et al. Binary Cuckoo Optimization Algorithm , 2013 .
[8] Mohammad Naderi Dehkordi,et al. Association rule hiding using cuckoo optimization algorithm , 2016, Expert Syst. Appl..
[9] Asadollah Shahbahrami,et al. Data sanitization in association rule mining: An analytical review , 2018, Expert Syst. Appl..
[10] Ahmad Khademzadeh,et al. A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms , 2009, J. Softw..
[11] Justin Zhijun Zhan,et al. Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining , 2016, Eng. Appl. Artif. Intell..
[12] Hossein Nezamabadi-pour,et al. BGSA: binary gravitational search algorithm , 2010, Natural Computing.
[13] Russell C. Eberhart,et al. A discrete binary version of the particle swarm algorithm , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[14] Somjit Arch-int,et al. Association rule hiding in risk management for retail supply chain collaboration , 2013, Comput. Ind..
[15] Stanley Robson de Medeiros Oliveira,et al. Privacy preserving frequent itemset mining , 2002 .
[16] Elisa Bertino,et al. Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.
[17] Shengyao Wang,et al. A novel binary fruit fly optimization algorithm for solving the multidimensional knapsack problem , 2013, Knowl. Based Syst..
[18] Muhammad Khurram Khan,et al. Binary Artificial Bee Colony optimization using bitwise operation , 2014, Comput. Ind. Eng..
[19] Shyue-Liang Wang,et al. Hiding informative association rule sets , 2007, Expert Syst. Appl..
[20] Philip S. Yu,et al. A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.
[21] Dayang N. A. Jawawi,et al. Electromagnetic field optimization: A physics-inspired metaheuristic optimization algorithm , 2016, Swarm Evol. Comput..
[22] Sebastián Ventura,et al. Educational data mining: A survey from 1995 to 2005 , 2007, Expert Syst. Appl..
[23] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[24] Brijesh Kumar Chaurasia,et al. Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s) , 2012 .
[25] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .