Search
Search Results
-
Statistical limitations of sensitive itemset hiding methods
Frequent Itemset Hiding has long been an area of study for privacy-preserving data mining. The goal is to alter a dataset so that it may be released...
-
Why do in-patients conceal hospitalization information?: an analysis based on association rule mining
As information technology rapidly advances, digitized personal information is becoming more accessible. However, the increasing likelihood of data...
-
Frequent itemset hiding revisited: pushing hiding constraints into mining
This paper introduces a new theoretical scheme for the solution of the frequent itemset hiding problem. We propose an algorithmic approach that...
-
Enhanced reversible and secure patient data hiding algorithm based on cellular automata
To guarantee a secure communication in E-medical platform, an enhanced reversible data hiding algorithm based on cellular automata has been presented...
-
Hiding sensitive frequent itemsets by item removal via two-level multi-objective optimization
Privacy Preserving Data Mining (PPDM) is an important research area in data mining, which aims at protecting the privacy during the data mining...
-
Secure itemset hiding in smart city sensor data
Sensor data that is often collected in the Internet of Things (IoT) or any smart city environment should be protected against security and privacy...
-
Distributed Scalable Association Rule Mining over Covid-19 Data
The worldwide Covid-19 widespread in 2020 has turned into a phenomenon that has shaken human life significantly. It is widely recognized that taking... -
ARTC: feature selection using association rules for text classification
Feature vectors are extracted to represent objects in many classification tasks, such as text classification. Due to the high dimensionality of these...
-
Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm
Nowadays, supermarkets and retail stores all use software systems with databases to store customer transactions. Over time, the volume of data is...
-
A Distributed, Penetrative and All-Dimensional Supervision Architecture for Consortium Blockchain
Consortium blockchain has been used widely in the field of bank, insurance, securities, commerce association and enterprise. However, the supervision... -
A Constraint-Based Model for the Frequent Itemset Hiding Problem
This paper introduces a novel constraint-based hiding model to drastically reduce the preprocessing overhead that is incurred by border-based... -
Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review
This study investigates existing input privacy-preserving data mining (PPDM) methods and privacy-preserving data stream mining methods (PPDSM),...
-
A Heuristic Approach for Sensitive Pattern Hiding with Improved Data Quality
Frequent itemset mining can be used to discover various interesting patterns present in dataset. However, this imposes a great privacy threat when... -
Hiding sensitive itemsets without side effects
Data mining techniques are being used to discover useful patterns hidden in the data. However, these data mining techniques also extract sensitive...
-
Research on Privacy Protection Methods for Data Mining
With the applications of big data and cloud computing technologies in industries, data mining technologies have been develo** rapidly in these... -
Research on the Method of Association Map** Between Service Architecture Design and Service Component Development
Aiming at the requirements for the interconnection, interworking and interoperability of avionics System of System (SoS), the service architecture... -
Privacy Preserving Mining System of Association Rules in OpenStack-Based Cloud
As an efficient data analysis tool, data mining can discover the potential association and regularity of massive data, and it has been widely used... -
Mining Association Rules from Code (MARC) to support legacy software management
This paper presents a methodology for Mining Association Rules from Code (MARC), aiming at capturing program structure, facilitating system...
-
Cryptography Fundamentals
Cryptographic history is incredibly long and fascinating. The Code Book: The Secrets Behind Codebreaking [1] is a comprehensive reference that... -
Computer Crime Investigations and Ethics
This chapter discusses what constitutes digital evidenceDigitalevidence, the collection and analysis of digital evidenceDigitalevidence, the...