A Survey on Association Rule Hiding Methods
暂无分享,去创建一个
[1] AlpanGülgün,et al. Risk assessment and management for supply chain networks , 2010 .
[2] Taneli Mielikäinen,et al. On Inverse Frequent Set Mining , 2003 .
[3] Vassilios S. Verykios. Association rule hiding methods , 2009, Encyclopedia of Data Warehousing and Mining.
[4] Dhiren R. Patel,et al. Maintaining privacy and data quality in privacy preserving association rule mining , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.
[5] Yücel Saygin,et al. Privacy preserving association rule mining , 2002, Proceedings Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002.
[6] Shyue-Liang Wang,et al. Using unknowns for hiding sensitive predictive association rules , 2005, IRI -2005 IEEE International Conference on Information Reuse and Integration, Conf, 2005..
[7] Udai Pratap Rao,et al. Hiding sensitive association rules to maintain privacy and data quality in database , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[8] Somjit Arch-int,et al. Association rule hiding in risk management for retail supply chain collaboration , 2013, Comput. Ind..
[9] Arbee L. P. Chen,et al. Hiding Sensitive Association Rules with Limited Side Effects , 2007, IEEE Transactions on Knowledge and Data Engineering.
[10] Philip S. Yu,et al. A border-based approach for hiding sensitive frequent itemsets , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[11] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[12] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[13] Chris Clifton,et al. Using unknowns to prevent discovery of association rules , 2001, SGMD.
[14] K. Duraiswamy,et al. Advanced Approach in Sensitive Rule Hiding , 2009 .
[15] Aris Gkoulalas-Divanis,et al. Exact Knowledge Hiding through Database Extension , 2009, IEEE Transactions on Knowledge and Data Engineering.
[16] Amit Thakkar,et al. A Study on Association Rule Hiding Approaches , 2012 .
[17] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[18] Dhiren R. Patel,et al. A Survey on Preserving Privacy for Sensitive Association Rules in Databases , 2010, BAIP.
[19] Aris Gkoulalas-Divanis,et al. An integer programming approach for frequent itemset hiding , 2006, CIKM '06.
[20] A. Tamilarasi,et al. Privacy preserving data mining based on association rule- a survey , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).
[21] Yücel Saygin,et al. Secure Association Rule Sharing , 2004, PAKDD.
[22] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[23] Elisa Bertino,et al. Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.
[24] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[25] Gonca Tuncel,et al. Risk assessment and management for supply chain networks: A case study , 2010, Comput. Ind..
[26] Yuhong Guo. Reconstruction-Based Association Rule Hiding , 2007 .
[27] George V. Moustakides,et al. A Max-Min Approach for Hiding Frequent Itemsets , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[28] Tzung-Pei Hong,et al. Hiding Sensitive Association Rules on Stars , 2010, 2010 IEEE International Conference on Granular Computing.