-
1
-
-
0029212693
-
-
R. Agrawal, R. Srikant, Mining sequential patterns, in: Proceedings of the 11th IEEE International Conference on Data Engineering, Taipei, Taiwan, 1995, pp. 3-14.
-
-
-
-
2
-
-
0041783510
-
-
R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proceedings of 2000 ACM SIGMOD International Conference on Management of Data, Dallas, Texas, 2000, pp. 439-450.
-
-
-
-
3
-
-
29844443821
-
-
R. Agrawal, R. Srikant, D. Thomas, privacy preserving OLAP, in: Proceedings of 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, 2005, pp. 251-262.
-
-
-
-
4
-
-
0242540443
-
-
J. Ayres, J. Flannick, J. Gehrke, T. Yiu, Sequential pattern mining using bitmap representation, in: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Alberta, Canada, 2002, pp. 102-111.
-
-
-
-
5
-
-
35748931341
-
-
C. Clifton, D. Marks, Security and privacy implication of data mining, in: Proceedings of 1996 ACM Workshop on Data Mining and Knowledge Discovery, Montreal, Canada, 1996, pp. 15-19.
-
-
-
-
6
-
-
35748957026
-
-
P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, P. Tan, Data mining for network intrusion detection, in: Proceedings of the NSF Workshop on Next Generation Data Mining, Baltimore, Maryland, 2002, pp. 73-81.
-
-
-
-
7
-
-
0242625281
-
-
A. Evfimievski, R. Srikant, R. Agrawal, J. Gehrke, Privacy preserving mining of association rules, in: Proceedings of 2002 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, 2002, pp. 217-228.
-
-
-
-
8
-
-
34547572516
-
-
T. Fukasawa, J. Wang, T. Takata, M. Miyazaki, An effective distributed privacy-preserving data mining algorithm, in: Proceedings of the 5th International Conference on Intelligent Data Engineering and Automated Learning, Exeter, UK, 2004, pp. 320-325.
-
-
-
-
9
-
-
35748952367
-
-
M. Garofalakis, R. Rastogi, K. Shim, SPIRIT: sequential pattern mining with regular expression constraints, in: Proceedings of the 25th International Conference on Very Large Data Bases, Edinburgh, UK, 1999, pp. 223-234.
-
-
-
-
10
-
-
0034593066
-
-
J. Han, J. Pei, B. Mortazavi-Asl, Q. Chen, U. Dayal, M. Hsu, FreeSpan: frequent pattern-projected sequential pattern mining, in: Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Boston, Massachusetts, 2000, pp. 355-359.
-
-
-
-
11
-
-
35748947409
-
-
J. Han, How can data mining help bio-data analysis?, in: Proceedings of the 2nd ACM SIGKDD Workshop on Data Mining in Bioinformatics, Edmonton, Canada, 2002, pp. 1-2.
-
-
-
-
12
-
-
2442430540
-
-
Y. Hu, B. Panda, A data mining approach for database intrusion detection, in: Proceedings of 2004 ACM Symposium on Applied Computing, New York, NY, 2004, pp. 711-716.
-
-
-
-
13
-
-
35748983967
-
-
M. Kantarcioglu, C. Clifton, Privacy-preserving distributed mining of association rules on horizontally partitioned data, in: Proceedings of 2002 ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, Madison, Wisconsin, 2002, pp. 24-31.
-
-
-
-
14
-
-
35748983060
-
-
H. Kum, J. Pei, W. Wang, D. Duncan, ApproxMAP: approximate mining of consensus sequential patterns, in: Proceedings of the 3rd SIAM International Conference on Data Mining, San Francisco, California, 2003, pp. 311-315.
-
-
-
-
15
-
-
84940104123
-
-
W. Lee, S. Stolfo, K. Mok, A data mining framework for building intrusion detection models, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, 1999, pp. 120-132.
-
-
-
-
16
-
-
84974555530
-
-
Y. Lindell, B. Pinkas, Privacy preserving data mining, in: Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, California, 2000, pp. 36-54.
-
-
-
-
17
-
-
84969551380
-
-
M. Lin, S. Lee, Improving the efficiency of interactive sequential pattern mining by incremental pattern discovery, in: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, Washington, DC, 2003, p. 68.2.
-
-
-
-
18
-
-
33144471694
-
A cubic-wise balance approach for privacy preservation in data cubes
-
Liu Y., Sung S., and Xiong H. A cubic-wise balance approach for privacy preservation in data cubes. Information Sciences 176 9 (2006) 1215-1240
-
(2006)
Information Sciences
, vol.176
, Issue.9
, pp. 1215-1240
-
-
Liu, Y.1
Sung, S.2
Xiong, H.3
-
19
-
-
0034247240
-
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
-
Luo J., and Bridges S. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection. International Journal of Intelligent Systems 15 8 (2000) 687-704
-
(2000)
International Journal of Intelligent Systems
, vol.15
, Issue.8
, pp. 687-704
-
-
Luo, J.1
Bridges, S.2
-
20
-
-
84947770983
-
-
F. Masseglia, F. Cathala, P. Poncelet, The PSP approach for mining sequential patterns, in: Proceedings of the 2nd European Symposium on Principle of Data Mining and Knowledge Discovery, Nantes, France, 1998, pp. 176-184.
-
-
-
-
22
-
-
0037818783
-
-
J. Pei, J. Han, W. Wang, Mining sequential patterns with constraints in large databases, in: Proceedings of the 11th International Conference on Information and Knowledge Management, McLean, Virginia, 2002, pp. 18-25.
-
-
-
-
23
-
-
13844256245
-
Mining sequential patterns by pattern-growth: the prefixspan approach
-
Pei J., Han J., Mortazavi-Asl B., Wang J., Pinto H., Chen Q., Dayal U., and Hsu M. Mining sequential patterns by pattern-growth: the prefixspan approach. IEEE Transactions on Knowledge and Data Engineering 16 11 (2004) 1424-1440
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.11
, pp. 1424-1440
-
-
Pei, J.1
Han, J.2
Mortazavi-Asl, B.3
Wang, J.4
Pinto, H.5
Chen, Q.6
Dayal, U.7
Hsu, M.8
-
24
-
-
35748984568
-
-
B. Pinkas, Cryptographic techniques for privacy-preserving data mining, SIGKDD explorations Newsletter of the ACM Special Interest Group on Knowledge Discovery and Data Mining 4(2) (2002) 12-15.
-
-
-
-
25
-
-
35748938609
-
-
S. Rizvi, J. Haritsa, Maintaining data privacy in association rule mining, in: Proceedings of the 28th International Conference on Very Large Data Bases, Hong Kong, China, 2002, pp. 682-693.
-
-
-
-
26
-
-
35748940148
-
-
G. Schadow, S.J. Grannis, C.J. McDonald, Discussion paper: privacy-preserving distributed queries for a clinical case research network, in: Proceedings of the IEEE ICDM Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, 2002, Vol. 14, pp. 55-65.
-
-
-
-
27
-
-
35048885636
-
-
S. Song, Z. Huang, H. Hu, S. Jin, A sequential pattern mining algorithm for misuse intrusion detection, in: Proceedings of the International Workshop on Information Security and Survivability for Grid, Wuhan, China, 2004, pp. 458-465.
-
-
-
-
28
-
-
84897708583
-
-
R. Srikant, R. Agrawal, Mining sequential patterns: generalizations and performance improvements, in: Proceedings of the 5th International Conference on Extending Database Technology, Avignon, France, 1996, pp. 3-17.
-
-
-
-
29
-
-
35748957327
-
-
X. Yan, J. Han, R. Afshar, CloSpan: mining closed sequential patterns in large databases, in: Proceedings of the 3rd SIAM International Conference on Data Mining, San Francisco, California, 2003, pp. 166-177.
-
-
-
-
30
-
-
35748943986
-
-
J. Zhan, L. Changy, S. Matwinz, Privacy-preserving collaborative sequential pattern mining, in: Proceedings of the SIAM International Workshop on Link Analysis, Counter-terrorism, and Privacy, Lake Buena Vista, Florida, 2004. pp. 61-72.
-
-
-
-
31
-
-
35748975018
-
-
Q. Zheng, K. Xu, W. Lv, S. Ma, The algorithms of updating sequential patterns, in: Proceedings of the 5th SIAM International Workshop on High Performance Data Mining, Arlington, Virginia, 2002.
-
-
-
-
32
-
-
33750333499
-
Privacy-preserving algorithms for distributed mining of frequent itemsets
-
Zhong S. Privacy-preserving algorithms for distributed mining of frequent itemsets. Information Sciences 177 2 (2007) 490-503
-
(2007)
Information Sciences
, vol.177
, Issue.2
, pp. 490-503
-
-
Zhong, S.1
|