Pufferfish: A framework for mathematical privacy definitions
In this article, we introduce a new and general privacy framework called Pufferfish. The
Pufferfish framework can be used to create new privacy definitions that are customized to the …
Pufferfish framework can be used to create new privacy definitions that are customized to the …
Data sanitization in association rule mining: An analytical review
Association rule hiding is the process of transforming a transaction database into a sanitized
version to protect sensitive knowledge and patterns. The challenge is to minimize the side …
version to protect sensitive knowledge and patterns. The challenge is to minimize the side …
A rigorous and customizable framework for privacy
In this paper we introduce a new and general privacy framework called Pufferfish. The
Pufferfish framework can be used to create new privacy definitions that are customized to the …
Pufferfish framework can be used to create new privacy definitions that are customized to the …
Privacy preserving data mining framework for negative association rules: An application to healthcare informatics
Protecting the privacy of healthcare information is an important part of encouraging data
custodians to give accurate records so that mining may proceed with confidence. The …
custodians to give accurate records so that mining may proceed with confidence. The …
Association rule hiding methods
VS Verykios - Wiley Interdisciplinary Reviews: Data Mining and …, 2013 - Wiley Online Library
Privacy preserving data mining has been recently introduced to cope with privacy issues
related to the data subjects in the course of the mining of the data. It has also been …
related to the data subjects in the course of the mining of the data. It has also been …
Privacy preserving utility mining: a survey
W Gan, J Chun-Wei, HC Chao… - … Conference on Big …, 2018 - ieeexplore.ieee.org
In big data era, the collected data usually contains rich information and hidden knowledge.
Utility-oriented pattern mining and analytics have shown a powerful ability to explore these …
Utility-oriented pattern mining and analytics have shown a powerful ability to explore these …
Exact knowledge hiding through database extension
A Gkoulalas-Divanis… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
In this paper, we propose a novel, exact border-based approach that provides an optimal
solution for the hiding of sensitive frequent itemsets by (i) minimally extending the original …
solution for the hiding of sensitive frequent itemsets by (i) minimally extending the original …
Privacy-preserving in association rule mining using an improved discrete binary artificial bee colony
Abstract Association Rule Hiding (ARH) is the process of protecting sensitive knowledge
using data transformation. Although there are some evolutionary-based ARH algorithms …
using data transformation. Although there are some evolutionary-based ARH algorithms …
Association rule hiding in risk management for retail supply chain collaboration
Association rule hiding is an efficient solution that helps enterprises avoid the risk caused by
sensitive knowledge leakage when sharing data in their collaborations. This study examines …
sensitive knowledge leakage when sharing data in their collaborations. This study examines …
Efficient algorithms for victim item selection in privacy-preserving utility mining
High-utility itemset mining has evolved as an essential and captivating research topic. It
aims to extract the patterns/itemsets having high utility value; hence, they are called high …
aims to extract the patterns/itemsets having high utility value; hence, they are called high …