Using unknowns to prevent discovery of association rules
ACM SIGMOD Record
Hiding Association Rules by Using Confidence and Support
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Disclosure Limitation of Sensitive Rules
KDEX '99 Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange
Privacy preserving frequent itemset mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Privacy-Preserving Data Mining: Why, How, and When
IEEE Security and Privacy
A Border-Based Approach for Hiding Sensitive Frequent Itemsets
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Suppressing Data Sets to Prevent Discovery of Association Rules
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Dare to share: Protecting sensitive knowledge with data sanitization
Decision Support Systems
Hiding informative association rule sets
Expert Systems with Applications: An International Journal
Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns
Information Systems Research
Hiding collaborative recommendation association rules
Applied Intelligence
Safely delegating data mining tasks
AusDM '06 Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61
Preserving privacy in association rule mining with bloom filters
Journal of Intelligent Information Systems
A MaxMin approach for hiding frequent itemsets
Data & Knowledge Engineering
A unified framework for protecting sensitive association rules in business collaboration
International Journal of Business Intelligence and Data Mining
Data reduction approach for sensitive associative classification rule hiding
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy Preserving Data Mining Research: Current Status and Key Issues
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Hiding Sensitive Associative Classification Rule by Data Reduction
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Privacy Preserving Market Basket Data Analysis
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
Employing PRBAC for privacy preserving data publishing
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Hiding co-occurring frequent itemsets
Proceedings of the 2009 EDBT/ICDT Workshops
HHUIF and MSICF: Novel algorithms for privacy preserving utility mining
Expert Systems with Applications: An International Journal
A data perturbation approach to sensitive classification rule hiding
Proceedings of the 2010 ACM Symposium on Applied Computing
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Associative classification rules hiding for privacy preservation
International Journal of Intelligent Information and Database Systems
Revisiting sequential pattern hiding to enhance utility
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Suppressing microdata to prevent probabilistic classification based inference
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Knowledge hiding from tree and graph databases
Data & Knowledge Engineering
An effective approach for hiding sensitive knowledge in data publishing
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
Utility-preserving transaction data anonymization with low information loss
Expert Systems with Applications: An International Journal
Utility-guided Clustering-based Transaction Data Anonymization
Transactions on Data Privacy
Bands of privacy preserving objectives: classification of PPDM strategies
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
Explicit authentication response considered harmful
Proceedings of the 2013 workshop on New security paradigms workshop
Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs
ACM Transactions on Knowledge Discovery from Data (TKDD)
Effective sanitization approaches to hide sensitive utility and frequent itemsets
Intelligent Data Analysis
Hi-index | 0.00 |
In this paper, we address the problem of protecting somesensitive knowledge in transactional databases. The challengeis on protecting actionable knowledge for strategicdecisions, but at the same time not losing the great benefitof association rule mining. To accomplish that, we introducea new, efficient one-scan algorithm that meets privacyprotection and accuracy in association rule mining, withoutputting at risk the effectiveness of the data mining per se.