Frequent itemset mining: A 25 years review

JM Luna, P Fournier‐Viger… - … Reviews: Data Mining …, 2019 - Wiley Online Library
Frequent itemset mining (FIM) is an essential task within data analysis since it is responsible
for extracting frequently occurring events, patterns, or items in data. Insights from such …

Frequent pattern mining: current status and future directions

J Han, H Cheng, D **n, X Yan - Data mining and knowledge discovery, 2007 - Springer
Frequent pattern mining has been a focused theme in data mining research for over a
decade. Abundant literature has been dedicated to this research and tremendous progress …

A survey of parallel sequential pattern mining

W Gan, JCW Lin, P Fournier-Viger, HC Chao… - ACM Transactions on …, 2019 - dl.acm.org
With the growing popularity of shared resources, large volumes of complex data of different
types are collected automatically. Traditional data mining algorithms generally have …

[KIRJA][B] Data mining: concepts and techniques

J Han, J Pei, H Tong - 2022 - books.google.com
Data Mining: Concepts and Techniques, Fourth Edition introduces concepts, principles, and
methods for mining patterns, knowledge, and models from various kinds of data for diverse …

Scalable algorithms for association mining

MJ Zaki - IEEE transactions on knowledge and data …, 2000 - ieeexplore.ieee.org
Association rule discovery has emerged as an important problem in knowledge discovery
and data mining. The association mining task consists of identifying the frequent itemsets …

Privacy-preserving distributed mining of association rules on horizontally partitioned data

M Kantarcioglu, C Clifton - IEEE transactions on knowledge and …, 2004 - ieeexplore.ieee.org
Data mining can extract important knowledge from large data collections ut sometimes these
collections are split among various parties. Privacy concerns may prevent the parties from …

Tools for privacy preserving distributed data mining

C Clifton, M Kantarcioglu, J Vaidya, X Lin… - ACM Sigkdd Explorations …, 2002 - dl.acm.org
Privacy preserving mining of distributed data has numerous applications. Each application
poses different constraints: What is meant by privacy, what are the desired results, how is the …

Poseidon: Mitigating interest flooding DDoS attacks in named data networking

A Compagno, M Conti, P Gasti… - 38th annual IEEE …, 2013 - ieeexplore.ieee.org
Content-Centric Networking (CCN) is an emerging networking paradigm being considered
as a possible replacement for the current IP-based host-centric Internet infrastructure. CCN …

State-of-the-art in privacy preserving data mining

VS Verykios, E Bertino, IN Fovino, LP Provenza… - ACM Sigmod …, 2004 - dl.acm.org
We provide here an overview of the new and rapidly emerging research area of privacy
preserving data mining. We also propose a classification hierarchy that sets the basis for …

[PDF][PDF] Association rules mining: A recent overview

S Kotsiantis, D Kanellopoulos - GESTS International Transactions on …, 2006 - eclass.hua.gr
In this paper, we provide the preliminaries of basic concepts about association rule mining
and survey the list of existing association rule mining techniques. Of course, a single article …