A COMPREHENSIVE RESEARCH ANALYSIS ON EFFECTIVE DATA MINING TECHNIQUES (original) (raw)

Developing Suitable Methods for Obtaining Better Accuracy in Privacy Preserving Association Rules Mining and Classification

ajer research

View PDFchevron_right

A Study of the Robustness of Association Rules

Philippe Lenca

Int. Conf. on Data Mining, 2007

View PDFchevron_right

Association Rule Hiding by Positions Swapping of Support and Confidence

Research Gyan

View PDFchevron_right

Hiding association rules by using confidence and support

Elisa Bertino

Information Hiding, 2001

View PDFchevron_right

On the robustness of association rules

Philippe Lenca

2006

View PDFchevron_right

IJERT-Protecting Sensitive Rules Based on Classification in Privacy Preserving Data Mining

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

Efficient sanitization of informative association rules☆

Shyue-Liang Wang

Expert Systems with Applications, 2008

View PDFchevron_right

Hiding Technique for Sensitive Rules by Swapping the Values of Support and Confidence

PJST Journal

View PDFchevron_right

Association Rule Hiding Methods

Vassilios Verykios

Concepts, Methodologies, Tools, and Applications, 2009

View PDFchevron_right

Protecting Sensitive Rules Based on Classification in Privacy Preserving Data Mining

Devangi Kotak

2013

View PDFchevron_right

Study of Hiding Sensitive Data in Data Mining Using Association Rules

IOSR Journals

View PDFchevron_right

Security Procedures for Classification Mining Algorithms

Vijay Raghavan

Database and Application Security XV, 2002

View PDFchevron_right

Hiding sensitive association rules using central tendency

Simon Fong

… Information Management and …, 2010

View PDFchevron_right

On Optimal Rule Mining: A Framework and a Necessary and Sufficient Condition of Antimonotonicity

Yannick Le Bras

… in Knowledge Discovery and Data Mining, 2009

View PDFchevron_right

A Survey on Preserving Privacy for Sensitive Association Rules in Databases

Chirag Modi

Information Processing and Management, 2010

View PDFchevron_right

Formal and computational properties of the confidence boost of association rules

Jose Alberto Balcazar

ACM Transactions on Knowledge Discovery from Data, 2013

View PDFchevron_right

IRJET- DECISION TREE LEARNING TECHNIQUE FOR MULTI-RELATIONAL CLASSIFICATION IN INFORMATION LEAKAGE PREVENTION SYSTEM

IRJET Journal

IRJET, 2020

View PDFchevron_right

Hiding sensitive association rules efficiently by introducing new variable hiding counter

PROF MAHUA BHATTACHARYA

2008 IEEE International Conference on Service Operations and Logistics, and Informatics, 2008

View PDFchevron_right

Approaches for Privacy Preserving Data Mining by Various Associations Rule Hiding Algorithms – A Survey

Umesh Sahu

International Journal of Computer Applications, 2016

View PDFchevron_right

Hiding Sensitive Association Rules with Limited Side Effects

Arbee L.p Chen

IEEE Transactions on Knowledge and Data Engineering, 2007

View PDFchevron_right

A Robustness Measure of Association Rules

Yannick Le Bras

Machine Learning and …, 2010

View PDFchevron_right

Optimized Support Balance Model For Sensitive Rule Hiding

sumegha sawa

2020

View PDFchevron_right

Association Rule Hiding in Privacy Preserving Data Mining

Vijayarani Mohan

International Journal of Information Security and Privacy, 2018

View PDFchevron_right

Privacy Preserving of Association Rule Mining: A Review

Ghanshyam Prajapati

2015

View PDFchevron_right

Role and Importance of Association Mining for Preserving Data

IJIRST - International Journal for Innovative Research in Science and Technology

View PDFchevron_right

Mining association rules with non-uniform privacy concerns

昀 季

2004

View PDFchevron_right

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A Survey on Various Methodologies of Hiding Association Rules for Privacy Preserving

KISHORI SHEKOKAR

2014

View PDFchevron_right

An Enhanced Algorithm for Hiding Sensitive Association Rules Based on ISL and DSR Algorithms

Nzar Ali, Sufyan Al-Janabi, Alaa Alhadithy

View PDFchevron_right

Security Data Mining: A Survey Introducing Tamper-Resistance

Clifton Phua

View PDFchevron_right

Review of Association Rule in Privacy Preserving Data Mining

IJSRD Journal

View PDFchevron_right

A Survey on Association Rule Hiding Approaches

Editor IJAERD

View PDFchevron_right

A framework for privacy preserving classification in data mining

perveez perveez

Proceedings of the Second Workshop on Australasian Information Security Data Mining and Web Intelligence and Software Internationalisation Volume 32, 2004

View PDFchevron_right

Association Rules Hiding for Privacy Preserving Data Mining: A Survey

Gehad Ahmed

International Journal of Computer Applications, 2016

View PDFchevron_right

Perfect Secrecy Designs for Contracted Rule Mining

sudeepthi govathoti

View PDFchevron_right

Hiding informative association rule sets

Shyue-Liang Wang

Expert Systems with Applications, 2007

View PDFchevron_right