Статті в журналах з теми "SENSITIVE RULES"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "SENSITIVE RULES".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Повний текст джерелаBansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (June 28, 2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Повний текст джерелаWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Повний текст джерелаRao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (October 31, 2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Повний текст джерелаWhittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (July 1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Повний текст джерелаJain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)." International Journal of Artificial Intelligence & Applications 3, no. 2 (March 31, 2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.
Повний текст джерелаWang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Повний текст джерелаGayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Повний текст джерелаMenon, Syam, Abhijeet Ghoshal, and Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules." Information Systems Research 33, no. 1 (March 2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.
Повний текст джерелаWu, Yi-hung, Chia-ming Chiang, and Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects." IEEE Transactions on Knowledge and Data Engineering 19, no. 1 (January 2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.
Повний текст джерелаDehkordi, Mohammad Naderi, Kambiz Badie, and Ahmad Khadem Zadeh. "A new approach for sensitive association rules hiding." International Journal of Rapid Manufacturing 1, no. 2 (2009): 128. http://dx.doi.org/10.1504/ijrapidm.2009.029379.
Повний текст джерелаSchmid-Hempel, Paul, and Regula Schmid-Hempel. "Nectar-collecting bees use Distance-sensitive movement rules." Animal Behaviour 34, no. 2 (April 1986): 605–7. http://dx.doi.org/10.1016/s0003-3472(86)80131-2.
Повний текст джерелаBonam, Janakiramaiah, and Ramamohan Reddy. "Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 39–62. http://dx.doi.org/10.4018/ijisp.2014070103.
Повний текст джерелаMohan, S. Vijayarani, and Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining." International Journal of Information Security and Privacy 12, no. 3 (July 2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.
Повний текст джерелаBoddez, Yannick, Marc Patrick Bennett, Silke van Esch, and Tom Beckers. "Bending rules: the shape of the perceptual generalisation gradient is sensitive to inference rules." Cognition and Emotion 31, no. 7 (September 28, 2016): 1444–52. http://dx.doi.org/10.1080/02699931.2016.1230541.
Повний текст джерелаKhuda Bux, Naadiya, Mingming Lu, Jianxin Wang, Saajid Hussain, and Yazan Aljeroudi. "Efficient Association Rules Hiding Using Genetic Algorithms." Symmetry 10, no. 11 (November 2, 2018): 576. http://dx.doi.org/10.3390/sym10110576.
Повний текст джерелаZwicky, Arnold M., Ellen M. Kaisse, and Michael Kenstowicz. "The phonology and syntax of wh-expressions in Tangale." Phonology Yearbook 4, no. 1 (May 1987): 229–41. http://dx.doi.org/10.1017/s0952675700000841.
Повний текст джерелаIqbal, Khalid, Dr Sohail Asghar, and Dr Abdulrehman Mirza. "Hiding Sensitive XML Association Rules With Supervised Learning Technique." Intelligent Information Management 03, no. 06 (2011): 219–29. http://dx.doi.org/10.4236/iim.2011.36027.
Повний текст джерелаClymer, John R., David J. Cheng, and Daniel Hernandez. "Induction of decision making rules for context sensitive systems." SIMULATION 59, no. 3 (September 1992): 198–206. http://dx.doi.org/10.1177/003754979205900308.
Повний текст джерелаBarca, Laura, Andrew W. Ellis, and Cristina Burani. "Context-sensitive rules and word naming in Italian children." Reading and Writing 20, no. 5 (November 28, 2006): 495–509. http://dx.doi.org/10.1007/s11145-006-9040-z.
Повний текст джерелаTalebi, Behnam, and Mohammad Naderi Dehkordi. "Sensitive association rules hiding using electromagnetic field optimization algorithm." Expert Systems with Applications 114 (December 2018): 155–72. http://dx.doi.org/10.1016/j.eswa.2018.07.031.
Повний текст джерелаKrishnamoorthy, Sathiyapriya, G. Sudha Sadasivam, M. Rajalakshmi, K. Kowsalyaa, and M. Dhivya. "Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization." International Journal of Intelligent Information Technologies 13, no. 2 (April 2017): 1–20. http://dx.doi.org/10.4018/ijiit.2017040101.
Повний текст джерелаB., Suma, and Shobha G. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (August 1, 2021): 3451. http://dx.doi.org/10.11591/ijece.v11i4.pp3451-3458.
Повний текст джерелаZhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules." Journal of Education, Humanities and Social Sciences 14 (May 30, 2023): 256–62. http://dx.doi.org/10.54097/ehss.v14i.8847.
Повний текст джерелаZhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules." Journal of Education, Humanities and Social Sciences 14 (May 30, 2023): 127–33. http://dx.doi.org/10.54097/ehss.v14i.8806.
Повний текст джерелаAli, Munawar. "Sustainability Index of Benoa Bay Beach Reclamation Against National Resistance." INFLUENCE: INTERNATIONAL JOURNAL OF SCIENCE REVIEW 5, no. 2 (April 5, 2023): 43–62. http://dx.doi.org/10.54783/influencejournal.v5i2.135.
Повний текст джерелаKAPLAN, ABBY. "How much homophony is normal?" Journal of Linguistics 47, no. 3 (April 18, 2011): 631–71. http://dx.doi.org/10.1017/s0022226711000053.
Повний текст джерелаLe, Bac, Lien Kieu, and Dat Tran. "DISTORTION-BASED HEURISTIC METHOD FOR SENSITIVE ASSOCIATION RULE HIDING." Journal of Computer Science and Cybernetics 35, no. 4 (October 31, 2019): 337–54. http://dx.doi.org/10.15625/1813-9663/35/4/14131.
Повний текст джерелаMary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (March 1, 2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.
Повний текст джерелаWhittle, Peter. "The risk-sensitive certainty equivalence principle." Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.2307/3214366.
Повний текст джерелаWhittle, Peter. "The risk-sensitive certainty equivalence principle." Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.1017/s0021900200117218.
Повний текст джерелаZwicky, Arnold M., Ellen M. Kaisse, Elizabeth A. Cowper, and Keren D. Rice. "Are phonosyntactic rules necessary?" Phonology Yearbook 4, no. 1 (May 1987): 185–94. http://dx.doi.org/10.1017/s0952675700000816.
Повний текст джерелаFelando, Cynthia. "Breaking the rules of the game." Short Film Studies 9, no. 2 (April 1, 2019): 157–60. http://dx.doi.org/10.1386/sfs.9.2.157_1.
Повний текст джерелаJing Yang, Junwei Zhang, Jianpei Zhang, and Lejun Zhang. "Blocking Inference Channels of Sensitive Rules in Data Stream Mining." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 7 (April 15, 2013): 196–203. http://dx.doi.org/10.4156/aiss.vol5.issue7.24.
Повний текст джерелаSirole, Tapan, and Jaytrilok Choudhary. "A Survey of Various Methodologies for Hiding Sensitive Association Rules." International Journal of Computer Applications 96, no. 18 (June 18, 2014): 12–15. http://dx.doi.org/10.5120/16893-6942.
Повний текст джерелаPatel, Deepak, and Vineet Richhariya. "C Privacy Prevention of Discriminating Rules by Perturbing Sensitive Items." Communications on Applied Electronics 2, no. 8 (September 24, 2015): 12–16. http://dx.doi.org/10.5120/cae2015651825.
Повний текст джерелаRajalakshmi, M., and T. Purusothaman. "Concealing party-centric sensitive rules in a centralized data source." International Journal of Machine Learning and Cybernetics 4, no. 5 (July 5, 2012): 515–25. http://dx.doi.org/10.1007/s13042-012-0111-y.
Повний текст джерелаZhao, Mingjun. "Optimal simple rules in RE models with risk sensitive preferences." Economics Letters 97, no. 3 (December 2007): 260–66. http://dx.doi.org/10.1016/j.econlet.2007.03.004.
Повний текст джерелаSharma, Dhiraj, Meenakshi Bansal, and Dinesh Grover. "Storage and Query Over Encrypted Sensitive Association Rules in Database." International Journal of Internet Technology and Secured Transactions 1, no. 1 (2019): 1. http://dx.doi.org/10.1504/ijitst.2019.10012622.
Повний текст джерелаBansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Storage and query over encrypted sensitive association rules in database." International Journal of Internet Technology and Secured Transactions 9, no. 3 (2019): 242. http://dx.doi.org/10.1504/ijitst.2019.101818.
Повний текст джерелаKhalil Jumaa, Alaa, Sufyan T. F. Al-Janabi, and Nazar Abedlqader Ali. "Hiding Sensitive Association Rules over Privacy Preserving Distributed Data Mining." Kirkuk University Journal-Scientific Studies 9, no. 1 (June 28, 2014): 59–72. http://dx.doi.org/10.32894/kujss.2014.89609.
Повний текст джерелаFerroni, Marina, Beatriz Diuk, and Milagros Mena. "Acquisition of orthographic knowledge: orthographic representations and context sensitive rules." psicología desde el caribe 33, no. 3 (September 1, 2016): 237–43. http://dx.doi.org/10.14482/psdc.33.3.6942.
Повний текст джерелаFerroni, Marina, Beatriz Diuk, and Milagros Mena. "Acquisition of orthographic knowledge: orthographic representations and context sensitive rules." Psicología desde el Caribe 33, no. 3 (November 15, 2016): 237–43. http://dx.doi.org/10.14482/psdc.33.3.9487.
Повний текст джерелаB., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (August 1, 2021): 1137. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.
Повний текст джерелаQuoc Le, Hai, Somjit Arch-int, and Ngamnij Arch-int. "Association Rule Hiding Based on Intersection Lattice." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/210405.
Повний текст джерелаJiang, Ying, Ming Jing, Jie Zeng, Feng Qi Shen, Du Lan Qi, and Li Hua Wang. "LanguageTool Based Proofreading of Sensitive Chinese Political Information." Applied Mechanics and Materials 687-691 (November 2014): 2644–47. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2644.
Повний текст джерелаYi, Tong, and Minyong Shi. "Privacy Protection Method for Multiple Sensitive Attributes Based on Strong Rule." Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/464731.
Повний текст джерелаNegus, Oliver J., Andrew Dunn, and William Ridsdill-Smith. "Lower limb acute joint injuries: when to refer for X-ray?" British Journal of Hospital Medicine 81, no. 3 (March 2, 2020): 1–5. http://dx.doi.org/10.12968/hmed.2020.0055.
Повний текст джерелаDOMINGO-FERRER, JOSEP, and VICENÇ TORRA. "A CRITIQUE OF THE SENSITIVITY RULES USUALLY EMPLOYED FOR STATISTICAL TABLE PROTECTION." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, no. 05 (October 2002): 545–56. http://dx.doi.org/10.1142/s0218488502001636.
Повний текст джерелаHayes, Daniel, Miguel Moreira, Isabel Boavida, Melanie Haslauer, Günther Unfer, Bernhard Zeiringer, Franz Greimel, Stefan Auer, Teresa Ferreira, and Stefan Schmutz. "Life Stage-Specific Hydropeaking Flow Rules." Sustainability 11, no. 6 (March 14, 2019): 1547. http://dx.doi.org/10.3390/su11061547.
Повний текст джерела