Secure Outsourced Association Rule Mining using Homomorphic Encryption
暂无分享,去创建一个
[1] M. B. Malik,et al. Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects , 2012, 2012 Third International Conference on Computer and Communication Technology.
[2] Graham J. Williams,et al. Data Mining , 2000, Communications in Computer and Information Science.
[3] Kim-Kwang Raymond Choo,et al. Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases , 2016, IEEE Transactions on Information Forensics and Security.
[4] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[5] Chris Clifton,et al. Secure set intersection cardinality with application to association rule mining , 2005, J. Comput. Secur..
[6] Mohammed J. Zaki. Scalable Algorithms for Association Mining , 2000, IEEE Trans. Knowl. Data Eng..
[7] Laks V. S. Lakshmanan,et al. Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases , 2013, IEEE Systems Journal.
[8] Jaideep Vaidya,et al. Privacy preserving association rule mining in vertically partitioned data , 2002, KDD.
[9] Rakesh Agarwal,et al. Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.
[10] Sheng Zhong,et al. Privacy-preserving algorithms for distributed mining of frequent itemsets , 2007, Inf. Sci..
[11] Geert Wets,et al. Using association rules for product assortment decisions: a case study , 1999, KDD '99.
[12] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[13] Ehud Gudes,et al. Association rules mining in vertically partitioned databases , 2006, Data Knowl. Eng..