-
1
-
-
84875100754
-
-
http://pages.cs.wisc.edu/~zeng/dfim.pdf.
-
-
-
-
2
-
-
0001882616
-
Fast algorithms for mining association rules
-
R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In VLDB, 1994.
-
(1994)
In VLDB
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
84963644331
-
Fast probabilistic algorithms for hamiltonian circuits and matchings
-
D. Angluin and L. G. Valiant. Fast probabilistic algorithms for hamiltonian circuits and matchings. In STOC, 1977.
-
(1977)
In STOC
-
-
Angluin, D.1
Valiant, L.G.2
-
6
-
-
34548756901
-
Mafia: A performance study of mining maximal frequent itemsets
-
D. Burdick, M. Calimlim, J. Flannick, J. Gehrke, and T. Yiu. Mafia: A performance study of mining maximal frequent itemsets. In FIMI, 2003.
-
(2003)
In FIMI
-
-
Burdick, D.1
Calimlim, M.2
Flannick, J.3
Gehrke, J.4
Yiu, T.5
-
7
-
-
79956041471
-
ρ-uncertainty: Inference proof transaction anonymization
-
J. Cao, P. Karras, C. Raissi, and K.-L. Tan. ρ-uncertainty: Inference proof transaction anonymization. In VLDB, 2010.
-
(2010)
In VLDB
-
-
Cao, J.1
Karras, P.2
Raissi, C.3
Tan, K.-L.4
-
8
-
-
84861595370
-
Publishing set-valued data via differential privacy
-
R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. VLDB, 2011.
-
(2011)
VLDB
-
-
Chen, R.1
Mohammed, N.2
Fung, B.C.M.3
Desai, B.C.4
Xiong, L.5
-
9
-
-
50249086141
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, 2006.
-
(2006)
In ICALP
-
-
Dwork, C.1
-
10
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. Mcsherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCS, 2006.
-
(2006)
In TCS
-
-
Dwork, C.1
Mcsherry, F.2
Nissim, K.3
Smith, A.4
-
13
-
-
0039253846
-
Mining frequent patterns without candidate generation
-
J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In SIGMOD, 2000.
-
(2000)
In SIGMOD
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
14
-
-
78049372159
-
Anonymization of set-valued data via top-down, local generalization
-
Y. He and J. F. Naughton. Anonymization of set-valued data via top-down, local generalization. VLDB, 2009.
-
(2009)
VLDB
-
-
He, Y.1
Naughton, J.F.2
-
15
-
-
0002784345
-
Algorithms for association rule mining: a general survey and comparison
-
J. Hipp, U. G̈untzer, and G. Nakhaeizadeh. Algorithms for association rule mining: a general survey and comparison. SIGKDD Explor. Newsl., 2000.
-
(2000)
SIGKDD Explor. Newsl
-
-
Hipp, J.1
G̈untzer, U.2
Nakhaeizadeh, G.3
-
16
-
-
84872862536
-
Privbasis: Frequent itemsets mining with differential privacy
-
N. Li, W. Qardaji, D. Su, and J. Cao. Privbasis: Frequent itemsets mining with differential privacy. In VLDB, 2012.
-
(2012)
In VLDB
-
-
Li, N.1
Qardaji, W.2
Su, D.3
Cao, J.4
-
18
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In SIGMOD, 2010.
-
(2010)
In SIGMOD
-
-
Rastogi, V.1
Nath, S.2
-
19
-
-
84859177489
-
Privacy-preserving anonymization of set-valued data
-
M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy-preserving anonymization of set-valued data. VLDB, 2008.
-
(2008)
VLDB
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
21
-
-
84875105014
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In ICDE, 2009.
-
(2009)
In ICDE
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
22
-
-
0035788918
-
Real world performance of association rule algorithms
-
Z. Zheng, R. Kohavi, and L. Mason. Real world performance of association rule algorithms. In KDD '01, 2001.
-
(2001)
In KDD '01
-
-
Zheng, Z.1
Kohavi, R.2
Mason, L.3
|