Journal articles on the topic 'ASSOCIATION RULE HIDING'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ASSOCIATION RULE HIDING.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Khurana, Garvit. "Association Rule Hiding using Hash Tree." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 787–89. http://dx.doi.org/10.31142/ijtsrd23037.
Full textVerykios, V. S., A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni. "Association rule hiding." IEEE Transactions on Knowledge and Data Engineering 16, no. 4 (April 2004): 434–47. http://dx.doi.org/10.1109/tkde.2004.1269668.
Full textVerykios, Vassilios S. "Association rule hiding methods." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 3, no. 1 (January 2013): 28–36. http://dx.doi.org/10.1002/widm.1082.
Full textWang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Full textQuoc Le, Hai, Somjit Arch-int, and Ngamnij Arch-int. "Association Rule Hiding Based on Intersection Lattice." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/210405.
Full textWang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Full textMohan, S. Vijayarani, and Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining." International Journal of Information Security and Privacy 12, no. 3 (July 2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.
Full textWang, Shyue-Liang, Bhavesh Parikh, and Ayat Jafari. "Hiding informative association rule sets." Expert Systems with Applications 33, no. 2 (August 2007): 316–23. http://dx.doi.org/10.1016/j.eswa.2006.05.022.
Full textÖztürk, Ahmet Cumhur, and Belgin Ergenç. "Dynamic Itemset Hiding Algorithm for Multiple Sensitive Support Thresholds." International Journal of Data Warehousing and Mining 14, no. 2 (April 2018): 37–59. http://dx.doi.org/10.4018/ijdwm.2018040103.
Full textB., Suma, and Shobha G. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (August 1, 2021): 3451. http://dx.doi.org/10.11591/ijece.v11i4.pp3451-3458.
Full textB., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (August 1, 2021): 1137. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.
Full textWang, Hui. "Association Rule: From Mining to Hiding." Applied Mechanics and Materials 321-324 (June 2013): 2570–73. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2570.
Full textGayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Full textB.Jadav, Khyati, Jignesh Vania, and Dhiren R. Patel. "A Survey on Association Rule Hiding Methods." International Journal of Computer Applications 82, no. 13 (November 15, 2013): 20–25. http://dx.doi.org/10.5120/14177-2357.
Full textS, Kasthuri, and Meyyappan T. "Hiding Sensitive Association Rule Using Heuristic Approach." International Journal of Data Mining & Knowledge Management Process 3, no. 1 (January 31, 2013): 57–63. http://dx.doi.org/10.5121/ijdkp.2013.3105.
Full textMurthy, T. Satyanarayana, and N. P. Gopalan. "A Novel Algorithm for Association Rule Hiding." International Journal of Information Engineering and Electronic Business 10, no. 3 (May 8, 2018): 45–50. http://dx.doi.org/10.5815/ijieeb.2018.03.06.
Full textChaudhari, Chaitrali, and Speril Machado. "Association Rule Hiding for Multi-Relational Database." International Journal of Computer Trends and Technology 30, no. 4 (December 25, 2015): 187–95. http://dx.doi.org/10.14445/22312803/ijctt-v30p133.
Full textAfshari, Mahtab Hossein, Mohammad Naderi Dehkordi, and Mehdi Akbari. "Association rule hiding using cuckoo optimization algorithm." Expert Systems with Applications 64 (December 2016): 340–51. http://dx.doi.org/10.1016/j.eswa.2016.08.005.
Full textLe, Bac, Lien Kieu, and Dat Tran. "DISTORTION-BASED HEURISTIC METHOD FOR SENSITIVE ASSOCIATION RULE HIDING." Journal of Computer Science and Cybernetics 35, no. 4 (October 31, 2019): 337–54. http://dx.doi.org/10.15625/1813-9663/35/4/14131.
Full textBonam, Janakiramaiah, and Ramamohan Reddy. "Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 39–62. http://dx.doi.org/10.4018/ijisp.2014070103.
Full textGarg, Vikram, Anju Singh, and Divakar Singh. "A Hybrid Algorithm for Association Rule Hiding using Representative Rule." International Journal of Computer Applications 97, no. 9 (July 18, 2014): 9–14. http://dx.doi.org/10.5120/17033-7334.
Full textDarwish, Saad M., Magda M. Madbouly, and Mohamed A. El-Hakeem. "A Database Sanitizing Algorithm for Hiding Sensitive Multi-Level Association Rule Mining." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 285–93. http://dx.doi.org/10.7763/ijcce.2014.v3.337.
Full textWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Full textSharmila, S., and S. Vijayarani. "Heuristic Approach in Association Rule Hiding- A Study." International Journal of Computer Sciences and Engineering 7, no. 5 (May 31, 2019): 300–305. http://dx.doi.org/10.26438/ijcse/v7i5.300305.
Full textCheng, Peng, Ivan Lee, Chun-Wei Lin, and Jeng-Shyang Pan. "Association rule hiding based on evolutionary multi-objective optimization." Intelligent Data Analysis 20, no. 3 (April 20, 2016): 495–514. http://dx.doi.org/10.3233/ida-160817.
Full textModak, Masooda, and Rizwana Shaikh. "Privacy Preserving Distributed Association Rule Hiding Using Concept Hierarchy." Procedia Computer Science 79 (2016): 993–1000. http://dx.doi.org/10.1016/j.procs.2016.03.126.
Full textRefaat, Mohamed, H. Aboelseoud, Khalid Shafee, and M. Badr. "Privacy Preserving Association Rule Hiding Techniques: Current Research Challenges." International Journal of Computer Applications 136, no. 6 (February 17, 2016): 11–17. http://dx.doi.org/10.5120/ijca2016908446.
Full textRajasekaran, M., M. S. Thanabal, and A. Meenakshi. "Association rule hiding using enhanced elephant herding optimization algorithm." Automatika 65, no. 1 (November 29, 2023): 98–107. http://dx.doi.org/10.1080/00051144.2023.2277998.
Full textMary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (March 1, 2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.
Full textKharwar, Ankit, Chandni Naik, Niyanta Desai, and Nikita Mistree. "Sensitive Association Rule Hiding using Hybrid Algorithm in Incremental Environment." International Journal of Computer Applications 180, no. 28 (March 20, 2018): 5–9. http://dx.doi.org/10.5120/ijca2018916650.
Full textkamani, Hiren R. "Improved Association Rule Hiding Algorithm for Privacy Preserving Data Mining." IOSR Journal of Engineering 4, no. 7 (July 2014): 36–41. http://dx.doi.org/10.9790/3021-04713641.
Full textGulwani, Padam. "Association Rule Hiding by Positions Swapping of Support and Confidence." International Journal of Information Technology and Computer Science 4, no. 4 (April 19, 2012): 54–61. http://dx.doi.org/10.5815/ijitcs.2012.04.08.
Full textR. Ponde, Mr Pravin, and Dr S. M. Jagade. "Privacy Preserving by Hiding Association Rule Mining from Transaction Database." IOSR Journal of Computer Engineering 16, no. 5 (2014): 25–31. http://dx.doi.org/10.9790/0661-16522531.
Full textRao, K. Srinivasa, Venkata Naresh Mandhala, Debnath Bhattacharyya, and Tai-hoon Kim. "An Association Rule hiding Algorithm for Privacy Preserving Data Mining." International Journal of Control and Automation 7, no. 10 (October 31, 2014): 393–404. http://dx.doi.org/10.14257/ijca.2014.7.10.36.
Full textDehkordi, Mohammad Noderi. "A Novel Association Rule Hiding Approach in OLAP Data Cubes." Indian Journal of Science and Technology 6, no. 2 (February 20, 2013): 1–13. http://dx.doi.org/10.17485/ijst/2013/v6i2.17.
Full textDuraiswamy, K., and N. Maheswari. "Sensitive Items in Privacy Preserving — Association Rule Mining." Journal of Information & Knowledge Management 07, no. 01 (March 2008): 31–35. http://dx.doi.org/10.1142/s0219649208001932.
Full textJoshi, Apoorva, and Pratima Gautam. "An optimized algorithm for association rule hiding technique using Hybrid Approach." International Journal of Computer Sciences and Engineering 7, no. 1 (January 31, 2019): 832–36. http://dx.doi.org/10.26438/ijcse/v7i1.832836.
Full textR. Ponde, Mr Pravin, Prof Chetan V. Andhare, and Dr S. M. Jagade. "Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule." IOSR Journal of Computer Engineering 16, no. 6 (2014): 60–65. http://dx.doi.org/10.9790/0661-16636065.
Full textLe, Hai Quoc, Somjit Arch-int, Huy Xuan Nguyen, and Ngamnij Arch-int. "Association rule hiding in risk management for retail supply chain collaboration." Computers in Industry 64, no. 7 (September 2013): 776–84. http://dx.doi.org/10.1016/j.compind.2013.04.011.
Full textVerykios, Vassilios S., Emmanuel D. Pontikakis, Yannis Theodoridis, and Liwu Chang. "Efficient algorithms for distortion and blocking techniques in association rule hiding." Distributed and Parallel Databases 22, no. 1 (July 13, 2007): 85–104. http://dx.doi.org/10.1007/s10619-007-7013-0.
Full textKrishnamoorthy, Sathiyapriya, and Kaviya Murugesan. "Protecting the Privacy of Cancer Patients Using Fuzzy Association Rule Hiding." Asian Pacific Journal of Cancer Prevention 20, no. 5 (May 1, 2019): 1437–43. http://dx.doi.org/10.31557/apjcp.2019.20.5.1437.
Full textTelikani, Akbar, and Asadollah Shahbahrami. "Optimizing association rule hiding using combination of border and heuristic approaches." Applied Intelligence 47, no. 2 (April 12, 2017): 544–57. http://dx.doi.org/10.1007/s10489-017-0906-3.
Full textKrishnamoorthy, Sathiyapriya, G. Sudha Sadasivam, M. Rajalakshmi, K. Kowsalyaa, and M. Dhivya. "Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization." International Journal of Intelligent Information Technologies 13, no. 2 (April 2017): 1–20. http://dx.doi.org/10.4018/ijiit.2017040101.
Full textZhang, Chao, and Linling He. "Data Mining Technology in Teaching Evaluation of Colleges and Universities." SHS Web of Conferences 187 (2024): 04030. http://dx.doi.org/10.1051/shsconf/202418704030.
Full textV. Waghchaure, Ms Snehal, Mr Nitin J. Khapale, and Ms Badhitala Thulasi. "Minimization of Side Effects of Knowledge Hiding Based On Association Rule Mining." IOSR Journal of Computer Engineering 16, no. 3 (2014): 83–90. http://dx.doi.org/10.9790/0661-16318390.
Full textGhiasi, Somayeh, and Mahdi Bateni. "Presenting a Hiding Algorithm for Improving Privacy Preserving in Association Rule Mining." International Journal of Computer Applications 103, no. 10 (October 18, 2014): 31–40. http://dx.doi.org/10.5120/18111-9240.
Full textAfzali, Golnar Assadat, and Shahriar Mohammadi. "Privacy preserving big data mining: association rule hiding using fuzzy logic approach." IET Information Security 12, no. 1 (January 1, 2018): 15–24. http://dx.doi.org/10.1049/iet-ifs.2015.0545.
Full textNdruru, Eferoni, and Taronisokhi Zebua. "Application of Text Message Held in Image Using Combination of Least Significant Bit Method and One Time Pad." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 13, no. 4 (October 31, 2019): 323. http://dx.doi.org/10.22146/ijccs.46401.
Full textGopagoni, Praveen Kumar, and Mohan Rao S K. "Distributed elephant herding optimization for grid-based privacy association rule mining." Data Technologies and Applications 54, no. 3 (May 15, 2020): 365–82. http://dx.doi.org/10.1108/dta-07-2019-0104.
Full textPraveena, Kurapati, Gudla Sirisha, Satukumati Babu, and Panchala Rao. "Efficient Method in Association Rule Hiding for Privacy Preserving with Data Mining Approach." Ingénierie des systèmes d information 24, no. 1 (April 20, 2019): 47–50. http://dx.doi.org/10.18280/isi.240106.
Full text