We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,213 results
  1. Statistical limitations of sensitive itemset hiding methods

    Frequent Itemset Hiding has long been an area of study for privacy-preserving data mining. The goal is to alter a dataset so that it may be released...

    Jangra Shalini, Toshniwal Durga, Clifton Chris in Applied Intelligence
    Article 20 July 2023
  2. Why do in-patients conceal hospitalization information?: an analysis based on association rule mining

    As information technology rapidly advances, digitized personal information is becoming more accessible. However, the increasing likelihood of data...

    Kuang-Ming Kuo, Paul C. Talley, Tain-Junn Cheng in Multimedia Tools and Applications
    Article 08 March 2024
  3. Frequent itemset hiding revisited: pushing hiding constraints into mining

    This paper introduces a new theoretical scheme for the solution of the frequent itemset hiding problem. We propose an algorithmic approach that...

    Vassilios S. Verykios, Elias C. Stavropoulos, ... Evangelos Sakkopoulos in Applied Intelligence
    Article 16 June 2021
  4. Enhanced reversible and secure patient data hiding algorithm based on cellular automata

    To guarantee a secure communication in E-medical platform, an enhanced reversible data hiding algorithm based on cellular automata has been presented...

    Article 02 June 2022
  5. Hiding sensitive frequent itemsets by item removal via two-level multi-objective optimization

    Privacy Preserving Data Mining (PPDM) is an important research area in data mining, which aims at protecting the privacy during the data mining...

    Mira Lefkir, Farid Nouioua, Philippe Fournier-Viger in Applied Intelligence
    Article 13 August 2022
  6. Secure itemset hiding in smart city sensor data

    Sensor data that is often collected in the Internet of Things (IoT) or any smart city environment should be protected against security and privacy...

    Gautam Srivastava, Jerry Chun-Wei Lin, Guo Lin in Cluster Computing
    Article 11 May 2023
  7. Distributed Scalable Association Rule Mining over Covid-19 Data

    The worldwide Covid-19 widespread in 2020 has turned into a phenomenon that has shaken human life significantly. It is widely recognized that taking...
    Mahtab Shahin, Wissem Inoubli, ... Dirk Draheim in Future Data and Security Engineering
    Conference paper 2021
  8. ARTC: feature selection using association rules for text classification

    Feature vectors are extracted to represent objects in many classification tasks, such as text classification. Due to the high dimensionality of these...

    Mozamel M. Saeed, Zaher Al Aghbari in Neural Computing and Applications
    Article 07 September 2022
  9. Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm

    Nowadays, supermarkets and retail stores all use software systems with databases to store customer transactions. Over time, the volume of data is...

    Duy Thanh Tran, Jun-Ho Huh in The Journal of Supercomputing
    Article 18 March 2023
  10. A Distributed, Penetrative and All-Dimensional Supervision Architecture for Consortium Blockchain

    Consortium blockchain has been used widely in the field of bank, insurance, securities, commerce association and enterprise. However, the supervision...
    **ao Chen, Zibin Zheng, ... **kai Liu in Blockchain and Trustworthy Systems
    Conference paper 2024
  11. A Constraint-Based Model for the Frequent Itemset Hiding Problem

    This paper introduces a novel constraint-based hiding model to drastically reduce the preprocessing overhead that is incurred by border-based...
    Vassilios S. Verykios, Elias C. Stavropoulos, ... Ahmed K. Elmagarmid in E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age
    Conference paper 2020
  12. Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review

    This study investigates existing input privacy-preserving data mining (PPDM) methods and privacy-preserving data stream mining methods (PPDSM),...

    U. H. W. A. Hewage, R. Sinha, M. Asif Naeem in Artificial Intelligence Review
    Article Open access 22 February 2023
  13. A Heuristic Approach for Sensitive Pattern Hiding with Improved Data Quality

    Frequent itemset mining can be used to discover various interesting patterns present in dataset. However, this imposes a great privacy threat when...
    Shalini Jangra, Durga Toshniowal in New Frontiers in Mining Complex Patterns
    Conference paper 2020
  14. Hiding sensitive itemsets without side effects

    Data mining techniques are being used to discover useful patterns hidden in the data. However, these data mining techniques also extract sensitive...

    Surendra H, Mohan H S in Applied Intelligence
    Article 29 October 2018
  15. Research on Privacy Protection Methods for Data Mining

    With the applications of big data and cloud computing technologies in industries, data mining technologies have been develo** rapidly in these...
    **dong He, Rongyan Cai, ... Dan Wu in Big Data and Security
    Conference paper 2023
  16. Research on the Method of Association Map** Between Service Architecture Design and Service Component Development

    Aiming at the requirements for the interconnection, interworking and interoperability of avionics System of System (SoS), the service architecture...
    Bing Xue, ZhiJuan Zhan, YunHui Wang in Complex Systems Design & Management
    Conference paper 2021
  17. Privacy Preserving Mining System of Association Rules in OpenStack-Based Cloud

    As an efficient data analysis tool, data mining can discover the potential association and regularity of massive data, and it has been widely used...
    Zhijun Zhang, Zeng Shou, ... Qi Zhang in Artificial Intelligence and Security
    Conference paper 2020
  18. Mining Association Rules from Code (MARC) to support legacy software management

    This paper presents a methodology for Mining Association Rules from Code (MARC), aiming at capturing program structure, facilitating system...

    Christos Tjortjis in Software Quality Journal
    Article 19 December 2019
  19. Cryptography Fundamentals

    Cryptographic history is incredibly long and fascinating. The Code Book: The Secrets Behind Codebreaking [1] is a comprehensive reference that...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++23
    Chapter 2023
  20. Computer Crime Investigations and Ethics

    This chapter discusses what constitutes digital evidenceDigitalevidence, the collection and analysis of digital evidenceDigitalevidence, the...
    Chapter 2023
Did you find what you were looking for? Share feedback.