An evolutionary computation‐based privacy‐preserving data mining model under a multithreshold constraint

[1]  Amin Salih Mohammed,et al.  Formal Verification of a Hybrid Machine Learning-Based Fault Prediction Model in Internet of Things Applications , 2020, IEEE Access.

[2]  Lu Yang,et al.  Mining of skyline patterns by considering both frequent and utility constraints , 2019, Eng. Appl. Artif. Intell..

[3]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[4]  Fadi Al-Turjman,et al.  AI for dynamic packet size optimization of batteryless IoT nodes: a case study for wireless body area sensor networks , 2020, Neural Computing and Applications.

[5]  Sinem Alturjman,et al.  Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.

[6]  Unil Yun,et al.  ASRNN: A recurrent neural network with an attention model for sequence labeling , 2020, Knowl. Based Syst..

[7]  Tzung-Pei Hong,et al.  A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion , 2013, J. Inf. Hiding Multim. Signal Process..

[8]  Md Zahidul Islam,et al.  Privacy preserving data mining: A noise addition framework using a novel clustering technique , 2011, Knowl. Based Syst..

[9]  Tzung-Pei Hong,et al.  Using TF-IDF to hide sensitive itemsets , 2012, Applied Intelligence.

[10]  Shuguo Han,et al.  Privacy-Preserving Genetic Algorithms for Rule Discovery , 2007, DaWaK.

[11]  Tzung-Pei Hong,et al.  Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms , 2014, TheScientificWorldJournal.

[12]  Tzung-Pei Hong,et al.  A sanitization approach for hiding sensitive itemsets based on particle swarm optimization , 2016, Eng. Appl. Artif. Intell..

[13]  Jian Pei,et al.  Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).

[14]  Chun-Hao Chen,et al.  A Grid-Based Swarm Intelligence Algorithm for Privacy-Preserving Data Mining , 2019, Applied Sciences.

[15]  Chien-Ming Chen,et al.  A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol , 2018, Applied Sciences.

[16]  Philip S. Yu,et al.  A Survey of Utility-Oriented Pattern Mining , 2018, IEEE Transactions on Knowledge and Data Engineering.

[17]  Philippe Fournier-Viger,et al.  Hiding sensitive itemsets with multiple objective optimization , 2019, Soft Computing.

[18]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[19]  Gautam Srivastava,et al.  Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments , 2021, IEEE Internet of Things Journal.

[20]  Justin Zhijun Zhan,et al.  Data mining in distributed environment: a survey , 2017, WIREs Data Mining Knowl. Discov..

[21]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[22]  Alireza Souri,et al.  A systematic review of IoT communication strategies for an efficient smart environment , 2019, Trans. Emerg. Telecommun. Technol..

[23]  Elisa Bertino,et al.  Hiding Association Rules by Using Confidence and Support , 2001, Information Hiding.

[24]  Philip S. Yu,et al.  A Survey of Parallel Sequential Pattern Mining , 2018, ACM Trans. Knowl. Discov. Data.

[25]  Tzung-Pei Hong,et al.  A Multiple Objective PSO-Based Approach for Data Sanitization , 2018, 2018 Conference on Technologies and Applications of Artificial Intelligence (TAAI).

[26]  Hamido Fujita,et al.  A survey of incremental high‐utility itemset mining , 2018, WIREs Data Mining Knowl. Discov..

[27]  Lu Yang,et al.  A Swarm-Based Approach to Mine High-Utility Itemsets , 2015, MISNC.

[28]  Guoyin Wang,et al.  Erratum to “Experimental Analyses of the Major Parameters Affecting the Intensity of Outbursts of Coal and Gas” , 2014, The Scientific World Journal.

[29]  Jimmy Ming-Tai Wu,et al.  A Sanitization Approach to Secure Shared Data in an IoT Environment , 2019, IEEE Access.

[30]  Salimur Choudhury,et al.  Dominating Set Algorithms for Wireless Sensor Networks Survivability , 2018, IEEE Access.

[31]  Tzung-Pei Hong,et al.  The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion , 2014, Applied Intelligence.

[32]  Philippe Fournier-Viger,et al.  PPSF: An Open-Source Privacy-Preserving and Security Mining Framework , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).