Hiding collaborative recommendation association rules
暂无分享,去创建一个
Tzung-Pei Hong | Shyue-Liang Wang | Dipen Patel | Ayat Jafari | T. Hong | Shyue-Liang Wang | A. Jafari | Dipen Patel
[1] Chris Clifton,et al. Using Sample Size to Limit Exposure to Data Mining , 2000, J. Comput. Secur..
[2] Osmar R. Zaïane,et al. Algorithms for balancing privacy and knowledge discovery in association rule mining , 2003, Seventh International Database Engineering and Applications Symposium, 2003. Proceedings..
[3] Stanley Robson de Medeiros Oliveira,et al. Privacy preserving frequent itemset mining , 2002 .
[4] Ljiljana Brankovic,et al. PRIVACY ISSUES IN KNOWLEDGE DISCOVERY AND DATA MINING , 2000 .
[5] Elisa Bertino,et al. Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.
[6] Chris Clifton,et al. SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .
[7] Chris Clifton,et al. Using unknowns to prevent discovery of association rules , 2001, SGMD.
[8] Jayant R. Haritsa,et al. Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.
[9] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[10] Daniel E. O'Leary,et al. Knowledge Discovery as a Threat to Database Security , 1991, Knowledge Discovery in Databases.
[11] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[12] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[13] Yücel Saygin,et al. Privacy preserving association rule mining , 2002, Proceedings Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002.
[14] Chris Clifton,et al. Protecting Against Data Mining through Samples , 1999, DBSec.
[15] Neil J. Hurley,et al. Collaborative recommendation: A robustness analysis , 2004, TOIT.
[16] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[17] Osmar R. Zaïane,et al. Protecting sensitive knowledge by data sanitization , 2003, Third IEEE International Conference on Data Mining.
[18] Bhavani M. Thuraisingham,et al. Data mining, national security, privacy and civil liberties , 2002, SKDD.
[19] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[20] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[21] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[22] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[23] Elisa Bertino,et al. Hiding Association Rules by Using Confidence and Support , 2001, Information Hiding.
[24] Stanley R. M. Oliveira,et al. A Framework for Enforcing Privacy in Mining Frequent Patterns , 2002 .
[25] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[26] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[27] Alexandre V. Evfimievski,et al. Randomization in privacy preserving data mining , 2002, SKDD.
[28] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[29] Sergio A. Alvarez,et al. Efficient Adaptive-Support Association Rule Mining for Recommender Systems , 2004, Data Mining and Knowledge Discovery.