A survey of utility-oriented pattern mining

W Gan, JCW Lin, P Fournier-Viger… - … on Knowledge and …, 2019 - ieeexplore.ieee.org
The main purpose of data mining and analytics is to find novel, potentially useful patterns
that can be utilized in real-world applications to derive beneficial knowledge. For identifying …

A novel method to solve real time security issues in software industry using advanced cryptographic techniques

B Gobinathan, MA Mukunthan… - Scientific …, 2021 - Wiley Online Library
In recent times, the utility and privacy are trade‐off factors with the performance of one factor
tends to sacrifice the other. Therefore, the dataset cannot be published without privacy. It is …

Efficient algorithms for mining top-k high utility itemsets

VS Tseng, CW Wu, P Fournier-Viger… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
High utility itemsets (HUIs) mining is an emerging topic in data mining, which refers to
discovering all itemsets having a utility meeting a user-specified minimum utility threshold …

Top-k high utility pattern mining with effective threshold raising strategies

H Ryang, U Yun - Knowledge-Based Systems, 2015 - Elsevier
In pattern mining, users generally set a minimum threshold to find useful patterns from
databases. As a result, patterns with higher values than the user-given threshold are …

An ACO-based approach to mine high-utility itemsets

JMT Wu, J Zhan, JCW Lin - Knowledge-Based Systems, 2017 - Elsevier
High-utility itemset mining (HUIM) is a major contemporary data mining issue. It is different
from frequent itemset mining (FIM), which only considers the frequency factor. HUIM applies …

Privacy preserving data mining framework for negative association rules: An application to healthcare informatics

SM Darwish, RM Essa, MA Osman, AA Ismail - IEEE Access, 2022 - ieeexplore.ieee.org
Protecting the privacy of healthcare information is an important part of encouraging data
custodians to give accurate records so that mining may proceed with confidence. The …

Differentially private random decision forests using smooth sensitivity

S Fletcher, MZ Islam - Expert systems with applications, 2017 - Elsevier
We propose a new differentially-private decision forest algorithm that minimizes both the
number of queries required, and the sensitivity of those queries. To do so, we build an …

Data privacy preservation and trade-off balance between privacy and utility using deep adaptive clustering and elliptic curve digital signature algorithm

N Yuvaraj, K Praghash, T Karthikeyan - Wireless Personal …, 2022 - Springer
The privacy and utility are treated as a major factor in influencing the role of data privacy
preservation in cloud environments. There exists a trade-off between these two factors …

An improved ensemble classification-based secure two stage bagging pruning technique for guaranteeing privacy preservation of DNA sequences in electronic health …

P Kaladevi, S Janakiraman… - Journal of Intelligent …, 2023 - content.iospress.com
The advent of machine learning in the recent decade has excelled in determining new
potential features and non-linear relationships existing between the data derived from the …

Privacy preserving utility mining: a survey

W Gan, J Chun-Wei, HC Chao… - … Conference on Big …, 2018 - ieeexplore.ieee.org
In big data era, the collected data usually contains rich information and hidden knowledge.
Utility-oriented pattern mining and analytics have shown a powerful ability to explore these …