mining algorithms: a review classification of privacy
TRANSCRIPT
Classification of Privacy Preserving DataMining Algorithms: A review
WORD COUNT 6164 TIME SUBMITTED 26-AUG-2020 11:09AM
PAPER ID 62521694
15%SIMILARITY INDEX
1
2
3
4
5
6
7
8
9
Classification of Privacy Preserving Data Mining Algorithms: AreviewORIGINALITY REPORT
PRIMARY SOURCES
publikasiilmiah.ums.ac.idInternet
www.yumpu.comInternet
"Encyclopedia of Database Systems", Springer Scienceand Business Media LLC, 2018Crossref
link.springer.comInternet
mafiadoc.comInternet
Weiwei Fang, Changsheng Zhou, Bingru Yang."Privacy preserving linear regression modeling ofdistributed databases", Optimization Letters, 2012Crossref
Tzung-Pei Hong. "Hiding sensitive itemsets byinserting dummy transactions", 2011 IEEEInternational Conference on Granular Computing, 11/2011Crossref
M HORNICK. "Overview of Data Mining", Java DataMining, 2007Crossref
En Tzu Wang, Guanling Lee. "An efficientsanitization algorithm for balancing information
129 words — 2%
112 words — 2%
60 words — 1%
33 words — 1%
28 words — 1%
27 words — 1%
24 words — < 1%
23 words — < 1%
20 words — < 1%
10
11
12
13
14
15
16
17
privacy and knowledge discovery in association patterns mining",Data & Knowledge Engineering, 2008Crossref
vneumann.etse.urv.esInternet
www.jatit.orgInternet
eden.dei.uc.ptInternet
Jerry Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger, Tzung-Pei Hong, Miroslav Voznak, JustinZhan. "A sanitization approach for hiding sensitive itemsets basedon particle swarm optimization", Engineering Applications ofArtificial Intelligence, 2016Crossref
Solikin, Mochamad, and Budi Setiawan."Mechanical Properties of Class C High Volume FlyAsh Concrete with Lime Water as Mixing Water", AppliedMechanics and Materials, 2014.Crossref
I. Saleh, A. Mokhtar, A. Shoukry, M. Eltoweissy."P3ARM: Privacy-Preserving Protocol forAssociation Rule Mining", 2006 IEEE Information AssuranceWorkshop, 2006Crossref
Chirag Modi. "A Survey on Preserving Privacy forSensitive Association Rules in Databases",Communications in Computer and Information Science, 2010Crossref
Ahmet Cumhur Öztürk, Belgin Ergenç. "DynamicItemset Hiding Algorithm for Multiple SensitiveSupport Thresholds", International Journal of Data Warehousingand Mining, 2018Crossref
18 words — < 1%
17 words — < 1%
14 words — < 1%
14 words — < 1%
14 words — < 1%
13 words — < 1%
12 words — < 1%
11 words — < 1%
18
19
20
21
22
23
24
25
26
27
research.sabanciuniv.eduInternet
Josep Domingo-Ferrer. "Statistical Databases",Wiley, 2008Crossref
ddd.uab.catInternet
www.iaeng.orgInternet
www.ijicic.orgInternet
Amiri, A.. "Dare to share: Protecting sensitiveknowledge with data sanitization", Decision SupportSystems, 200702Crossref
Cheng, Peng, Jeng-Shyang Pan, and Chun-Wei LinHarbin. "Use EMO to protect sensitive knowledge inassociation rule mining by removing items", 2014 IEEE Congresson Evolutionary Computation (CEC), 2014.Crossref
vuir.vu.edu.auInternet
Kaosar, M.G.. "Fully homomorphic encryption basedtwo-party association rule mining", Data &Knowledge Engineering, 201206/08Crossref
Janakiramaiah Bonam, Ramamohan Reddy."Balanced Approach for Hiding Sensitive AssociationRules in Data Sharing Environment", International Journal ofInformation Security and Privacy, 2014Crossref
media.proquest.comInternet
11 words — < 1%
11 words — < 1%
11 words — < 1%
10 words — < 1%
9 words — < 1%
9 words — < 1%
9 words — < 1%
9 words — < 1%
9 words — < 1%
9 words — < 1%
9 words — < 1%
28
29
30
31
32
33
34
35
36
37
38
Internet
ir.nuk.edu.tw:8080Internet
www.iis.sinica.edu.twInternet
Yi-hung Wu. "<![CDATA[Hiding Sensitive AssociationRules with Limited Side Effects]]>", IEEETransactions on Knowledge and Data Engineering, 1/2007Crossref
Mortazavi, Reza, and Saeed Jalili. "Fast data-oriented microaggregation algorithm for largenumerical datasets", Knowledge-Based Systems, 2014.Crossref
www.ijert.orgInternet
theses.gla.ac.ukInternet
Navarro-Arribas, G.. "Information fusion in dataprivacy: A survey", Information Fusion, 201210Crossref
J. Domingo-Ferrer, A. Solanas, A. Martinez-Balleste."Privacy in Statistical Databases: k-AnonymityThrough Microaggregation", 2006 IEEE International Conferenceon Granular Computing, 2006Crossref
Chang, C.C.. "TFRP: An efficient microaggregationalgorithm for statistical disclosure control", TheJournal of Systems & Software, 200711Crossref
Chai Wah Wu. "Privacy preserving data mining withunidirectional interaction", 2005 IEEE International
9 words — < 1%
8 words — < 1%
8 words — < 1%
8 words — < 1%
8 words — < 1%
8 words — < 1%
8 words — < 1%
7 words — < 1%
7 words — < 1%
7 words — < 1%
7 words — < 1%
39
40
41
EXCLUDE QUOTES ON
EXCLUDEBIBLIOGRAPHY
ON
EXCLUDE MATCHES OFF
Symposium on Circuits and Systems, 2005Crossref
Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu,Yanfeng Shi. "Toward Practical Privacy-PreservingFrequent Itemset Mining on Encrypted Cloud Data", IEEETransactions on Cloud Computing, 2020Crossref
"Encyclopedia of Database Systems", SpringerScience and Business Media LLC, 2009Crossref
"Privacy-Preserving Data Mining", Springer Scienceand Business Media LLC, 2008Crossref
7 words — < 1%
7 words — < 1%
7 words — < 1%