Artykuły w czasopismach na temat „RULE HIDING”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „RULE HIDING”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Verykios, V. S., A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni. "Association rule hiding." IEEE Transactions on Knowledge and Data Engineering 16, no. 4 (2004): 434–47. http://dx.doi.org/10.1109/tkde.2004.1269668.
Pełny tekst źródłaKhurana, Garvit. "Association Rule Hiding using Hash Tree." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (2019): 787–89. http://dx.doi.org/10.31142/ijtsrd23037.
Pełny tekst źródłaQuoc Le, Hai, Somjit Arch-int, and Ngamnij Arch-int. "Association Rule Hiding Based on Intersection Lattice." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/210405.
Pełny tekst źródłaWang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Pełny tekst źródłaMohan, S. Vijayarani, and Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining." International Journal of Information Security and Privacy 12, no. 3 (2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.
Pełny tekst źródłaVerykios, Vassilios S. "Association rule hiding methods." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 3, no. 1 (2013): 28–36. http://dx.doi.org/10.1002/widm.1082.
Pełny tekst źródłaWang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Pełny tekst źródłaÖztürk, Ahmet Cumhur, and Belgin Ergenç. "Dynamic Itemset Hiding Algorithm for Multiple Sensitive Support Thresholds." International Journal of Data Warehousing and Mining 14, no. 2 (2018): 37–59. http://dx.doi.org/10.4018/ijdwm.2018040103.
Pełny tekst źródłaWang, Shyue-Liang, Bhavesh Parikh, and Ayat Jafari. "Hiding informative association rule sets." Expert Systems with Applications 33, no. 2 (2007): 316–23. http://dx.doi.org/10.1016/j.eswa.2006.05.022.
Pełny tekst źródłaB., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1137. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.
Pełny tekst źródłaGayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Pełny tekst źródłaB., Suma, and Shobha G. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451. http://dx.doi.org/10.11591/ijece.v11i4.pp3451-3458.
Pełny tekst źródłaWang, Hui. "Association Rule: From Mining to Hiding." Applied Mechanics and Materials 321-324 (June 2013): 2570–73. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2570.
Pełny tekst źródłaLe, Bac, Lien Kieu, and Dat Tran. "DISTORTION-BASED HEURISTIC METHOD FOR SENSITIVE ASSOCIATION RULE HIDING." Journal of Computer Science and Cybernetics 35, no. 4 (2019): 337–54. http://dx.doi.org/10.15625/1813-9663/35/4/14131.
Pełny tekst źródłaGarg, Vikram, Anju Singh, and Divakar Singh. "A Hybrid Algorithm for Association Rule Hiding using Representative Rule." International Journal of Computer Applications 97, no. 9 (2014): 9–14. http://dx.doi.org/10.5120/17033-7334.
Pełny tekst źródłaBonam, Janakiramaiah, and Ramamohan Reddy. "Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment." International Journal of Information Security and Privacy 8, no. 3 (2014): 39–62. http://dx.doi.org/10.4018/ijisp.2014070103.
Pełny tekst źródłaB.Jadav, Khyati, Jignesh Vania, and Dhiren R. Patel. "A Survey on Association Rule Hiding Methods." International Journal of Computer Applications 82, no. 13 (2013): 20–25. http://dx.doi.org/10.5120/14177-2357.
Pełny tekst źródłaS, Kasthuri, and Meyyappan T. "Hiding Sensitive Association Rule Using Heuristic Approach." International Journal of Data Mining & Knowledge Management Process 3, no. 1 (2013): 57–63. http://dx.doi.org/10.5121/ijdkp.2013.3105.
Pełny tekst źródłaMurthy, T. Satyanarayana, and N. P. Gopalan. "A Novel Algorithm for Association Rule Hiding." International Journal of Information Engineering and Electronic Business 10, no. 3 (2018): 45–50. http://dx.doi.org/10.5815/ijieeb.2018.03.06.
Pełny tekst źródłaChaudhari, Chaitrali, and Speril Machado. "Association Rule Hiding for Multi-Relational Database." International Journal of Computer Trends and Technology 30, no. 4 (2015): 187–95. http://dx.doi.org/10.14445/22312803/ijctt-v30p133.
Pełny tekst źródłaAfshari, Mahtab Hossein, Mohammad Naderi Dehkordi, and Mehdi Akbari. "Association rule hiding using cuckoo optimization algorithm." Expert Systems with Applications 64 (December 2016): 340–51. http://dx.doi.org/10.1016/j.eswa.2016.08.005.
Pełny tekst źródłaWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Pełny tekst źródłaSharmila, S., and S. Vijayarani. "Heuristic Approach in Association Rule Hiding- A Study." International Journal of Computer Sciences and Engineering 7, no. 5 (2019): 300–305. http://dx.doi.org/10.26438/ijcse/v7i5.300305.
Pełny tekst źródłaWette, Philip, and Holger Karl. "Which flows are hiding behind my wildcard rule?" ACM SIGCOMM Computer Communication Review 43, no. 4 (2013): 541–42. http://dx.doi.org/10.1145/2534169.2491710.
Pełny tekst źródłaDarwish, Saad M., Magda M. Madbouly, and Mohamed A. El-Hakeem. "A Database Sanitizing Algorithm for Hiding Sensitive Multi-Level Association Rule Mining." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 285–93. http://dx.doi.org/10.7763/ijcce.2014.v3.337.
Pełny tekst źródłaSCHWINGHAMMER, JAN, LARS BIRKEDAL, FRANÇOIS POTTIER, BERNHARD REUS, KRISTIAN STØVRING, and HONGSEOK YANG. "A step-indexed Kripke model of hidden state." Mathematical Structures in Computer Science 23, no. 1 (2012): 1–54. http://dx.doi.org/10.1017/s0960129512000035.
Pełny tekst źródłaMary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.
Pełny tekst źródłaCheng, Peng, Ivan Lee, Chun-Wei Lin, and Jeng-Shyang Pan. "Association rule hiding based on evolutionary multi-objective optimization." Intelligent Data Analysis 20, no. 3 (2016): 495–514. http://dx.doi.org/10.3233/ida-160817.
Pełny tekst źródłaModak, Masooda, and Rizwana Shaikh. "Privacy Preserving Distributed Association Rule Hiding Using Concept Hierarchy." Procedia Computer Science 79 (2016): 993–1000. http://dx.doi.org/10.1016/j.procs.2016.03.126.
Pełny tekst źródłaRefaat, Mohamed, H. Aboelseoud, Khalid Shafee, and M. Badr. "Privacy Preserving Association Rule Hiding Techniques: Current Research Challenges." International Journal of Computer Applications 136, no. 6 (2016): 11–17. http://dx.doi.org/10.5120/ijca2016908446.
Pełny tekst źródłaRajasekaran, M., M. S. Thanabal, and A. Meenakshi. "Association rule hiding using enhanced elephant herding optimization algorithm." Automatika 65, no. 1 (2023): 98–107. http://dx.doi.org/10.1080/00051144.2023.2277998.
Pełny tekst źródłaKharwar, Ankit, Chandni Naik, Niyanta Desai, and Nikita Mistree. "Sensitive Association Rule Hiding using Hybrid Algorithm in Incremental Environment." International Journal of Computer Applications 180, no. 28 (2018): 5–9. http://dx.doi.org/10.5120/ijca2018916650.
Pełny tekst źródłakamani, Hiren R. "Improved Association Rule Hiding Algorithm for Privacy Preserving Data Mining." IOSR Journal of Engineering 4, no. 7 (2014): 36–41. http://dx.doi.org/10.9790/3021-04713641.
Pełny tekst źródłaGulwani, Padam. "Association Rule Hiding by Positions Swapping of Support and Confidence." International Journal of Information Technology and Computer Science 4, no. 4 (2012): 54–61. http://dx.doi.org/10.5815/ijitcs.2012.04.08.
Pełny tekst źródłaR. Ponde, Mr Pravin, and Dr S. M. Jagade. "Privacy Preserving by Hiding Association Rule Mining from Transaction Database." IOSR Journal of Computer Engineering 16, no. 5 (2014): 25–31. http://dx.doi.org/10.9790/0661-16522531.
Pełny tekst źródłaRao, K. Srinivasa, Venkata Naresh Mandhala, Debnath Bhattacharyya, and Tai-hoon Kim. "An Association Rule hiding Algorithm for Privacy Preserving Data Mining." International Journal of Control and Automation 7, no. 10 (2014): 393–404. http://dx.doi.org/10.14257/ijca.2014.7.10.36.
Pełny tekst źródłaDehkordi, Mohammad Noderi. "A Novel Association Rule Hiding Approach in OLAP Data Cubes." Indian Journal of Science and Technology 6, no. 2 (2013): 1–13. http://dx.doi.org/10.17485/ijst/2013/v6i2.17.
Pełny tekst źródłaCheng, Peng, John F. Roddick, Shu-Chuan Chu, and Chun-Wei Lin. "Privacy preservation through a greedy, distortion-based rule-hiding method." Applied Intelligence 44, no. 2 (2015): 295–306. http://dx.doi.org/10.1007/s10489-015-0671-0.
Pełny tekst źródłaKrishnamoorthy, Sathiyapriya, G. Sudha Sadasivam, M. Rajalakshmi, K. Kowsalyaa, and M. Dhivya. "Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization." International Journal of Intelligent Information Technologies 13, no. 2 (2017): 1–20. http://dx.doi.org/10.4018/ijiit.2017040101.
Pełny tekst źródłaZhang, Chao, and Linling He. "Data Mining Technology in Teaching Evaluation of Colleges and Universities." SHS Web of Conferences 187 (2024): 04030. http://dx.doi.org/10.1051/shsconf/202418704030.
Pełny tekst źródłaQi, Gaoxin, Jichao Li, Xueming Xu, Gang Chen, and Kewei Yang. "An attack–defense game model in infrastructure networks under link hiding." Chaos: An Interdisciplinary Journal of Nonlinear Science 32, no. 11 (2022): 113109. http://dx.doi.org/10.1063/5.0112907.
Pełny tekst źródłaJoshi, Apoorva, and Pratima Gautam. "An optimized algorithm for association rule hiding technique using Hybrid Approach." International Journal of Computer Sciences and Engineering 7, no. 1 (2019): 832–36. http://dx.doi.org/10.26438/ijcse/v7i1.832836.
Pełny tekst źródłaR. Ponde, Mr Pravin, Prof Chetan V. Andhare, and Dr S. M. Jagade. "Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule." IOSR Journal of Computer Engineering 16, no. 6 (2014): 60–65. http://dx.doi.org/10.9790/0661-16636065.
Pełny tekst źródłaZamani Boroujeni, Farsad, and Doryaneh Hossein Afshari. "An Efficient Rule-Hiding Method for Privacy Preserving in Transactional Databases." Journal of Computing and Information Technology 25, no. 4 (2018): 279–90. http://dx.doi.org/10.20532/cit.2017.1003680.
Pełny tekst źródłaLe, Hai Quoc, Somjit Arch-int, Huy Xuan Nguyen, and Ngamnij Arch-int. "Association rule hiding in risk management for retail supply chain collaboration." Computers in Industry 64, no. 7 (2013): 776–84. http://dx.doi.org/10.1016/j.compind.2013.04.011.
Pełny tekst źródłaVerykios, Vassilios S., Emmanuel D. Pontikakis, Yannis Theodoridis, and Liwu Chang. "Efficient algorithms for distortion and blocking techniques in association rule hiding." Distributed and Parallel Databases 22, no. 1 (2007): 85–104. http://dx.doi.org/10.1007/s10619-007-7013-0.
Pełny tekst źródłaKrishnamoorthy, Sathiyapriya, and Kaviya Murugesan. "Protecting the Privacy of Cancer Patients Using Fuzzy Association Rule Hiding." Asian Pacific Journal of Cancer Prevention 20, no. 5 (2019): 1437–43. http://dx.doi.org/10.31557/apjcp.2019.20.5.1437.
Pełny tekst źródłaTelikani, Akbar, and Asadollah Shahbahrami. "Optimizing association rule hiding using combination of border and heuristic approaches." Applied Intelligence 47, no. 2 (2017): 544–57. http://dx.doi.org/10.1007/s10489-017-0906-3.
Pełny tekst źródłaJalid, Alfian Abdul, Agus Harjoko, and Anny Kartika Sari. "Steganographic Model for encrypted messages based on DNA Encoding." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 15, no. 1 (2021): 43. http://dx.doi.org/10.22146/ijccs.61767.
Pełny tekst źródłaDuraiswamy, K., and N. Maheswari. "Sensitive Items in Privacy Preserving — Association Rule Mining." Journal of Information & Knowledge Management 07, no. 01 (2008): 31–35. http://dx.doi.org/10.1142/s0219649208001932.
Pełny tekst źródła