[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms

A Gkoulalas-Divanis, G Loukides, J Sun - Journal of biomedical informatics, 2014 - Elsevier
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …

An alternative way to predict knowledge hiding: The lens of transformational leadership

V Scuotto, C Nespoli, PT Tran, G Cappiello - Journal of Business Research, 2022 - Elsevier
The present study explores one of the biggest causes of the lack of organizational
knowledge creation: knowledge hiding (KH). KH can be provoked by the deviant and …

Data sanitization in association rule mining: An analytical review

A Telikani, A Shahbahrami - Expert Systems with Applications, 2018 - Elsevier
Association rule hiding is the process of transforming a transaction database into a sanitized
version to protect sensitive knowledge and patterns. The challenge is to minimize the side …

The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks

B Zhou, J Pei - Knowledge and information systems, 2011 - Springer
Recently, more and more social network data have been published in one way or another.
Preserving privacy in publishing social network data becomes an important concern. With …

[KSIĄŻKA][B] Association rule hiding for data mining

A Gkoulalas-Divanis, VS Verykios - 2010 - books.google.com
Privacy and security risks arising from the application of different data mining techniques to
large institutional data repositories have been solely investigated by a new research …

On link privacy in randomizing social networks

X Ying, X Wu - Knowledge and information systems, 2011 - Springer
Many applications of social networks require relationship anonymity due to the sensitive,
stigmatizing, or confidential nature of relationship. Recent work showed that the simple …

A fast perturbation algorithm using tree structure for privacy preserving utility mining

U Yun, J Kim - Expert Systems with Applications, 2015 - Elsevier
As one of the important approaches in privacy preserving data mining, privacy preserving
utility mining has been studied to find more meaningful results while database privacy is …

Privacy-preserving in association rule mining using an improved discrete binary artificial bee colony

A Telikani, AH Gandomi, A Shahbahrami… - Expert Systems with …, 2020 - Elsevier
Abstract Association Rule Hiding (ARH) is the process of protecting sensitive knowledge
using data transformation. Although there are some evolutionary-based ARH algorithms …

Association rule hiding using cuckoo optimization algorithm

MH Afshari, MN Dehkordi, M Akbari - Expert Systems with Applications, 2016 - Elsevier
Privacy preserving data mining is a new research field that aims to protect the private
information and avoid the leakage of this information during the data mining process. One of …

HHUIF and MSICF: Novel algorithms for privacy preserving utility mining

JS Yeh, PC Hsu - Expert Systems with Applications, 2010 - Elsevier
Privacy preserving data mining (PPDM) is a popular topic in the research community. How to
strike a balance between privacy protection and knowledge discovery in the sharing process …