메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

Personalized privacy-preserving frequent itemset mining using randomized response

Author keywords

[No Author keywords available]

Indexed keywords

ARTICLE; CONTROLLED STUDY; DATA COLLECTION METHOD; DATA MINING; FREQUENT ITEMSET MINING; MEASUREMENT ACCURACY; PERSONALIZED PRIVACY; PRIVACY; PROTECTION; RANDOMIZED RESPONSE TECHNIQUE; SYSTEM ANALYSIS; ALGORITHM; FACTUAL DATABASE;

EID: 84899574762     PISSN: None     EISSN: 1537744X     Source Type: Journal    
DOI: 10.1155/2014/686151     Document Type: Article
Times cited : (23)

References (21)
  • 3
    • 84861621894 scopus 로고    scopus 로고
    • Mining association rules under privacy constraints
    • New York, NY, USA Springer
    • Haritsa J. R., Mining association rules under privacy constraints. Privacy-Preserving Data Mining 2008 New York, NY, USA Springer 239 266
    • (2008) Privacy-Preserving Data Mining , pp. 239-266
    • Haritsa, J.R.1
  • 5
    • 77956224773 scopus 로고    scopus 로고
    • Optimal random perturbation at multiple privacy levels
    • Xiao X., Tao Y., Chen M., Optimal random perturbation at multiple privacy levels. Proceedings of the VLDB Endowment 2009 2 1 814 825
    • (2009) Proceedings of the VLDB Endowment , vol.2 , Issue.1 , pp. 814-825
    • Xiao, X.1    Tao, Y.2    Chen, M.3
  • 6
    • 11144317669 scopus 로고
    • Randomized response techniques for multiple sensitive attributes
    • 10.1080/01621459.1981.10477741
    • Tamhane A. C., Randomized response techniques for multiple sensitive attributes. Journal of the American Statistical Association 1981 76 376 916 923 10.1080/01621459.1981.10477741
    • (1981) Journal of the American Statistical Association , vol.76 , Issue.376 , pp. 916-923
    • Tamhane, A.C.1
  • 8
    • 79960571030 scopus 로고    scopus 로고
    • A survey of association rule hiding methods for privacy
    • New York, NY, USA Springer
    • Verykios V. S., Gkoulalas-Divanis A., A survey of association rule hiding methods for privacy. Privacy-Preserving Data Mining 2008 New York, NY, USA Springer 267 289
    • (2008) Privacy-Preserving Data Mining , pp. 267-289
    • Verykios, V.S.1    Gkoulalas-Divanis, A.2
  • 9
    • 33845625238 scopus 로고    scopus 로고
    • Hiding sensitive association rules with limited side effects
    • 2-s2.0-33845625238 10.1109/TKDE.2007.250583
    • Wu Y.-H., Chiang C.-M., Chen A. L. P., Hiding sensitive association rules with limited side effects. IEEE Transactions on Knowledge and Data Engineering 2007 19 1 29 42 2-s2.0-33845625238 10.1109/TKDE.2007.250583
    • (2007) IEEE Transactions on Knowledge and Data Engineering , vol.19 , Issue.1 , pp. 29-42
    • Wu, Y.-H.1    Chiang, C.-M.2    Chen, A.L.P.3
  • 10
    • 84880954718 scopus 로고    scopus 로고
    • An experimental study of distortion-based techniques for association rule hiding
    • Springer IFIP International Federation for Information Processing 10.1007/1-4020-8128-6-22
    • Pontikakis E. D., Tsitsonis A. A., Verykios V. S., An experimental study of distortion-based techniques for association rule hiding. Research Directions in Data and Applications Security XVIII 2004 144 Springer 325 339 IFIP International Federation for Information Processing 10.1007/1-4020-8128-6-22
    • (2004) Research Directions in Data and Applications Security XVIII , vol.144 , pp. 325-339
    • Pontikakis, E.D.1    Tsitsonis, A.A.2    Verykios, V.S.3
  • 13
    • 34548591826 scopus 로고    scopus 로고
    • A border-based approach for hiding sensitive frequent itemsets
    • November 2005 Houston, Tex, USA IEEE 2-s2.0-34548591826 10.1109/ICDM.2005.2
    • Xingzhi S., Yu P. S., A border-based approach for hiding sensitive frequent itemsets. Proceedings of the 5th IEEE International Conference on Data Mining (ICDM '05) November 2005 Houston, Tex, USA IEEE 426 433 2-s2.0-34548591826 10.1109/ICDM.2005.2
    • Proceedings of the 5th IEEE International Conference on Data Mining (ICDM '05) , pp. 426-433
    • Xingzhi, S.1    Yu, P.S.2
  • 15
    • 25844456648 scopus 로고    scopus 로고
    • Maximizing accuracy of shared databases when concealing sensitive patterns
    • 2-s2.0-25844456648 10.1287/isre.1050.0056
    • Menon S., Sarkar S., Mukherjee S., Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research 2005 16 3 256 270 2-s2.0-25844456648 10.1287/isre.1050.0056
    • (2005) Information Systems Research , vol.16 , Issue.3 , pp. 256-270
    • Menon, S.1    Sarkar, S.2    Mukherjee, S.3
  • 18
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • 2-s2.0-4544361334 10.1109/TKDE.2004.45
    • Kantarcioglu M., Clifton C., Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering 2004 16 9 1026 1037 2-s2.0-4544361334 10.1109/TKDE.2004.45
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 19
    • 35048843897 scopus 로고    scopus 로고
    • A new scheme on privacy preserving association rule mining
    • Lecture Notes in Computer Science 2-s2.0-35048843897 10.1007/978-3-540- 30116-5-44
    • Zhang N., Wang S., Zhao W., A new scheme on privacy preserving association rule mining. Knowledge Discovery in Databases: PKDD 2004 2004 3202 484 495 Lecture Notes in Computer Science 2-s2.0-35048843897 10.1007/978-3-540-30116-5-44
    • (2004) Knowledge Discovery in Databases: PKDD 2004 , vol.3202 , pp. 484-495
    • Zhang, N.1    Wang, S.2    Zhao, W.3
  • 20
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • 2-s2.0-0013776710
    • Warner S. L., Randomized response: a survey technique for eliminating evasive answer bias. Journal of the American Statistical Association 1965 60 309 63 66 2-s2.0-0013776710
    • (1965) Journal of the American Statistical Association , vol.60 , Issue.309 , pp. 63-66
    • Warner, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.