[PDF][PDF] Mining rare itemset with automated support thresholds

KSC Sadhasivam, T Angamuthu - Journal of Computer Science, 2011 - Citeseer
Problem statement: Frequent itemset mining is an important task in data mining to discover
the hidden, interesting associations between items in the database based on the user …

[PDF][PDF] Hybrid algorithm for privacy preserving association rule mining

I Chandrakar, YU Rani, M Manasa… - Journal of Computer …, 2010 - researchgate.net
Problem statement: The objective of the hybrid algorithm for privacy preserving data mining
is to hide certain sensitive information so that they cannot be discovered through association …

[PDF][PDF] Privacy preserving association rule mining in vertically partitioned databases

NVM Lakshmi, KS Rani - International Journal of Computer …, 2012 - academia.edu
Data mining techniques are useful to discover hidden patterns from the large databases.
Association rule mining is one of the important data mining techniques to discover …

[PDF][PDF] A modified hiding high utility item first algorithm (HHUIF) with item selector (MHIS) for hiding sensitive itemsets

R Selvaraj, VM Kuthadi - Journal of Innovative Computing, Information …, 2013 - core.ac.uk
In privacy preserving data mining, utility mining plays an important role. In privacy preserving
utility mining, some sensitive itemsets are concealed from the database according to certain …

Data mining without data: A novel approach to privacy-preserving collaborative distributed data mining

V Ashok, R Mukkamala - Proceedings of the 10th annual ACM workshop …, 2011 - dl.acm.org
With the proliferation of organizations that independently collect various types of data, with
the growing awareness of corporations and public to keep their sensitive data private, and …

[PDF][PDF] A descriptive framework for the multidimensional medical data mining and representation

V Sankaradass, K Arputharaj - Journal of Computer Science, 2011 - academia.edu
Problem statement: Association rule mining with fuzzy logic was explored by research for
effective datamining and classification. Approach: It was used to find all the rules existing in …

Review on high utility rare itemset mining

SZ Ninoria, SS Thakur - Social Networking and Computational Intelligence …, 2020 - Springer
Today's era is an era of data. Hence, the most attentive field of research and study is to
collect and select the data rapidly as per the need nowadays. Data mining is the field which …

Privacy as a machine

S Al-Fedaghi - … Conference on Information System and Artificial …, 2016 - ieeexplore.ieee.org
Surveys indicate that privacy persists as an issue of public and individual concern. It is a
highly relevant issue in systems engineering today, and the need for privacy studies will be …

[引用][C] 基于垂直数据分布的大型稠密数据库快速关联规则挖掘算法

崔建, 李强, 杨龙坡 - 计算机科学, 2011

[PDF][PDF] Privacy Preserving Data Mining Technique-Issues and Challenges

M Rathi, A Rajavat - ijcsnt.info
The technology improves the ability of data storage and their processing. Therefore a
significant growth on different business domains is observed. The business intelligence …