An evolutionary computation‐based privacy‐preserving data mining model under a multithreshold constraint
暂无分享,去创建一个
Gautam Srivastava | Unil Yun | Chun-Wei Lin | Shahab Tayeb | Jimmy Ming-Tai Wu | Gautam Srivastava | Chun-Wei Lin | Unil Yun | J. Wu | Shahab Tayeb
[1] Amin Salih Mohammed,et al. Formal Verification of a Hybrid Machine Learning-Based Fault Prediction Model in Internet of Things Applications , 2020, IEEE Access.
[2] Lu Yang,et al. Mining of skyline patterns by considering both frequent and utility constraints , 2019, Eng. Appl. Artif. Intell..
[3] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[4] Fadi Al-Turjman,et al. AI for dynamic packet size optimization of batteryless IoT nodes: a case study for wireless body area sensor networks , 2020, Neural Computing and Applications.
[5] Sinem Alturjman,et al. Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.
[6] Unil Yun,et al. ASRNN: A recurrent neural network with an attention model for sequence labeling , 2020, Knowl. Based Syst..
[7] Tzung-Pei Hong,et al. A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion , 2013, J. Inf. Hiding Multim. Signal Process..
[8] Md Zahidul Islam,et al. Privacy preserving data mining: A noise addition framework using a novel clustering technique , 2011, Knowl. Based Syst..
[9] Tzung-Pei Hong,et al. Using TF-IDF to hide sensitive itemsets , 2012, Applied Intelligence.
[10] Shuguo Han,et al. Privacy-Preserving Genetic Algorithms for Rule Discovery , 2007, DaWaK.
[11] Tzung-Pei Hong,et al. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms , 2014, TheScientificWorldJournal.
[12] Tzung-Pei Hong,et al. A sanitization approach for hiding sensitive itemsets based on particle swarm optimization , 2016, Eng. Appl. Artif. Intell..
[13] Jian Pei,et al. Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[14] Chun-Hao Chen,et al. A Grid-Based Swarm Intelligence Algorithm for Privacy-Preserving Data Mining , 2019, Applied Sciences.
[15] Chien-Ming Chen,et al. A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol , 2018, Applied Sciences.
[16] Philip S. Yu,et al. A Survey of Utility-Oriented Pattern Mining , 2018, IEEE Transactions on Knowledge and Data Engineering.
[17] Philippe Fournier-Viger,et al. Hiding sensitive itemsets with multiple objective optimization , 2019, Soft Computing.
[18] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[19] Gautam Srivastava,et al. Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments , 2021, IEEE Internet of Things Journal.
[20] Justin Zhijun Zhan,et al. Data mining in distributed environment: a survey , 2017, WIREs Data Mining Knowl. Discov..
[21] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[22] Alireza Souri,et al. A systematic review of IoT communication strategies for an efficient smart environment , 2019, Trans. Emerg. Telecommun. Technol..
[23] Elisa Bertino,et al. Hiding Association Rules by Using Confidence and Support , 2001, Information Hiding.
[24] Philip S. Yu,et al. A Survey of Parallel Sequential Pattern Mining , 2018, ACM Trans. Knowl. Discov. Data.
[25] Tzung-Pei Hong,et al. A Multiple Objective PSO-Based Approach for Data Sanitization , 2018, 2018 Conference on Technologies and Applications of Artificial Intelligence (TAAI).
[26] Hamido Fujita,et al. A survey of incremental high‐utility itemset mining , 2018, WIREs Data Mining Knowl. Discov..
[27] Lu Yang,et al. A Swarm-Based Approach to Mine High-Utility Itemsets , 2015, MISNC.
[28] Guoyin Wang,et al. Erratum to “Experimental Analyses of the Major Parameters Affecting the Intensity of Outbursts of Coal and Gas” , 2014, The Scientific World Journal.
[29] Jimmy Ming-Tai Wu,et al. A Sanitization Approach to Secure Shared Data in an IoT Environment , 2019, IEEE Access.
[30] Salimur Choudhury,et al. Dominating Set Algorithms for Wireless Sensor Networks Survivability , 2018, IEEE Access.
[31] Tzung-Pei Hong,et al. The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion , 2014, Applied Intelligence.
[32] Philippe Fournier-Viger,et al. PPSF: An Open-Source Privacy-Preserving and Security Mining Framework , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).