An Optimization based Modified Maximum Sensitive Item-Sets Conflict First Algorithm (MSICF) for Hiding Sensitive Item-Sets
暂无分享,去创建一个
D. Jaya Kumari | Nistala. V. E. S. Murthy | S. Srinivasa Suresh | K. Sivakumar | H. Kargupta | I. N. Fovino | N. Murthy | L. P. Provenza | S. Suresh | Fengli Liu | Souptik Datta | Benjamin C. M. Fung | Jaya Kumari | Ke Wang | Rui Chen | P. S. Yu | Qi wang | V. V. S. S. S. Balaram | Md. Afroze | Md. JaffarSadiq | Xiaodan Wu | Chao-HsienChu | Yunfeng Wang | E. Bertino
[1] Xinjun Qi,et al. An Overview of Privacy Preserving Data Mining , 2012 .
[2] Yunfeng Wang,et al. Privacy Preserving Data Mining Research: Current Status and Key Issues , 2007, International Conference on Computational Science.
[3] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[4] Chris Clifton,et al. Using Sample Size to Limit Exposure to Data Mining , 2000, J. Comput. Secur..
[5] Philip S. Yu,et al. Association Rule Hiding using Artificial Bee Colony Algorithm , 2011 .
[6] Md. Riyazuddin. An Empirical Study on Privacy Preserving Data Mining , 2012 .
[7] Guillermo Navarro-Arribas,et al. User k-anonymity for privacy preserving data mining of query logs , 2012, Inf. Process. Manag..
[8] Vadlamani Ravi,et al. Privacy preserving data mining using particle swarm optimisation trained auto-associative neural network: an application to bankruptcy prediction in banks , 2012, Int. J. Data Min. Model. Manag..
[9] Jieh-Shan Yeh,et al. Novel Algorithms for Privacy Preserving Utility Mining , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[10] Elisa Bertino,et al. A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.
[11] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[12] Michal Sramka. Data mining as a tool in privacy-preserving data publishing , 2010 .
[13] Alexandre V. Evfimievski,et al. Randomization in privacy preserving data mining , 2002, SKDD.
[14] Yadong Wang,et al. A Privacy-Preserving Classification Method Based on Singular Value Decomposition , 2012, Int. Arab J. Inf. Technol..
[15] Jieh-Shan Yeh,et al. HHUIF and MSICF: Novel algorithms for privacy preserving utility mining , 2010, Expert Syst. Appl..
[16] M. D. Zuber. An Empirical Study on Privacy Preserving Data Mining , 2012 .
[17] Ziauddin Khan Zia,et al. Research on Association Rule Mining , 2012 .
[18] Chris Clifton,et al. Using unknowns to prevent discovery of association rules , 2001, SGMD.
[19] Keke Chen,et al. Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation , 2009, IEEE Transactions on Parallel and Distributed Systems.
[20] Stanley Robson de Medeiros Oliveira,et al. Privacy preserving frequent itemset mining , 2002 .
[21] Lior Rokach,et al. Privacy-preserving data mining: A feature set partitioning approach , 2010, Inf. Sci..
[22] Qi Wang,et al. Random-data perturbation techniques and privacy-preserving data mining , 2005, Knowledge and Information Systems.
[23] Ahmad Khademzadeh,et al. A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms , 2009, J. Softw..