14
Classification of Privacy Preserving Data Mining Algorithms: A review WORD COUNT 6164 TIME SUBMITTED 26-AUG-2020 11:09AM PAPER ID 62521694

Mining Algorithms: A review Classification of Privacy

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Classification of Privacy Preserving DataMining Algorithms: A review

WORD COUNT 6164 TIME SUBMITTED 26-AUG-2020 11:09AM

PAPER ID 62521694

15%SIMILARITY INDEX

1

2

3

4

5

6

7

8

9

Classification of Privacy Preserving Data Mining Algorithms: AreviewORIGINALITY REPORT

PRIMARY SOURCES

publikasiilmiah.ums.ac.idInternet

www.yumpu.comInternet

"Encyclopedia of Database Systems", Springer Scienceand Business Media LLC, 2018Crossref

link.springer.comInternet

mafiadoc.comInternet

Weiwei Fang, Changsheng Zhou, Bingru Yang."Privacy preserving linear regression modeling ofdistributed databases", Optimization Letters, 2012Crossref

Tzung-Pei Hong. "Hiding sensitive itemsets byinserting dummy transactions", 2011 IEEEInternational Conference on Granular Computing, 11/2011Crossref

M HORNICK. "Overview of Data Mining", Java DataMining, 2007Crossref

En Tzu Wang, Guanling Lee. "An efficientsanitization algorithm for balancing information

129 words — 2%

112 words — 2%

60 words — 1%

33 words — 1%

28 words — 1%

27 words — 1%

24 words — < 1%

23 words — < 1%

20 words — < 1%

10

11

12

13

14

15

16

17

privacy and knowledge discovery in association patterns mining",Data & Knowledge Engineering, 2008Crossref

vneumann.etse.urv.esInternet

www.jatit.orgInternet

eden.dei.uc.ptInternet

Jerry Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger, Tzung-Pei Hong, Miroslav Voznak, JustinZhan. "A sanitization approach for hiding sensitive itemsets basedon particle swarm optimization", Engineering Applications ofArtificial Intelligence, 2016Crossref

Solikin, Mochamad, and Budi Setiawan."Mechanical Properties of Class C High Volume FlyAsh Concrete with Lime Water as Mixing Water", AppliedMechanics and Materials, 2014.Crossref

I. Saleh, A. Mokhtar, A. Shoukry, M. Eltoweissy."P3ARM: Privacy-Preserving Protocol forAssociation Rule Mining", 2006 IEEE Information AssuranceWorkshop, 2006Crossref

Chirag Modi. "A Survey on Preserving Privacy forSensitive Association Rules in Databases",Communications in Computer and Information Science, 2010Crossref

Ahmet Cumhur Öztürk, Belgin Ergenç. "DynamicItemset Hiding Algorithm for Multiple SensitiveSupport Thresholds", International Journal of Data Warehousingand Mining, 2018Crossref

18 words — < 1%

17 words — < 1%

14 words — < 1%

14 words — < 1%

14 words — < 1%

13 words — < 1%

12 words — < 1%

11 words — < 1%

18

19

20

21

22

23

24

25

26

27

research.sabanciuniv.eduInternet

Josep Domingo-Ferrer. "Statistical Databases",Wiley, 2008Crossref

ddd.uab.catInternet

www.iaeng.orgInternet

www.ijicic.orgInternet

Amiri, A.. "Dare to share: Protecting sensitiveknowledge with data sanitization", Decision SupportSystems, 200702Crossref

Cheng, Peng, Jeng-Shyang Pan, and Chun-Wei LinHarbin. "Use EMO to protect sensitive knowledge inassociation rule mining by removing items", 2014 IEEE Congresson Evolutionary Computation (CEC), 2014.Crossref

vuir.vu.edu.auInternet

Kaosar, M.G.. "Fully homomorphic encryption basedtwo-party association rule mining", Data &Knowledge Engineering, 201206/08Crossref

Janakiramaiah Bonam, Ramamohan Reddy."Balanced Approach for Hiding Sensitive AssociationRules in Data Sharing Environment", International Journal ofInformation Security and Privacy, 2014Crossref

media.proquest.comInternet

11 words — < 1%

11 words — < 1%

11 words — < 1%

10 words — < 1%

9 words — < 1%

9 words — < 1%

9 words — < 1%

9 words — < 1%

9 words — < 1%

9 words — < 1%

9 words — < 1%

28

29

30

31

32

33

34

35

36

37

38

Internet

ir.nuk.edu.tw:8080Internet

www.iis.sinica.edu.twInternet

Yi-hung Wu. "<![CDATA[Hiding Sensitive AssociationRules with Limited Side Effects]]>", IEEETransactions on Knowledge and Data Engineering, 1/2007Crossref

Mortazavi, Reza, and Saeed Jalili. "Fast data-oriented microaggregation algorithm for largenumerical datasets", Knowledge-Based Systems, 2014.Crossref

www.ijert.orgInternet

theses.gla.ac.ukInternet

Navarro-Arribas, G.. "Information fusion in dataprivacy: A survey", Information Fusion, 201210Crossref

J. Domingo-Ferrer, A. Solanas, A. Martinez-Balleste."Privacy in Statistical Databases: k-AnonymityThrough Microaggregation", 2006 IEEE International Conferenceon Granular Computing, 2006Crossref

Chang, C.C.. "TFRP: An efficient microaggregationalgorithm for statistical disclosure control", TheJournal of Systems & Software, 200711Crossref

Chai Wah Wu. "Privacy preserving data mining withunidirectional interaction", 2005 IEEE International

9 words — < 1%

8 words — < 1%

8 words — < 1%

8 words — < 1%

8 words — < 1%

8 words — < 1%

8 words — < 1%

7 words — < 1%

7 words — < 1%

7 words — < 1%

7 words — < 1%

39

40

41

EXCLUDE QUOTES ON

EXCLUDEBIBLIOGRAPHY

ON

EXCLUDE MATCHES OFF

Symposium on Circuits and Systems, 2005Crossref

Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu,Yanfeng Shi. "Toward Practical Privacy-PreservingFrequent Itemset Mining on Encrypted Cloud Data", IEEETransactions on Cloud Computing, 2020Crossref

"Encyclopedia of Database Systems", SpringerScience and Business Media LLC, 2009Crossref

"Privacy-Preserving Data Mining", Springer Scienceand Business Media LLC, 2008Crossref

7 words — < 1%

7 words — < 1%

7 words — < 1%