Author:
Chien Nguyen Khac,Trang Dang Thi Kim
Publisher
Springer International Publishing
Reference16 articles.
1. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (2000)
2. Atallah, M., et al.: Disclosure limitation of sensitive rules. In: Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX1999) (Cat. No. PR00453). IEEE (1999)
3. Fournier‐Viger, P., et al.: A survey of itemset mining. Wiley Interdiscipl. Rev. Data Min. Knowl. Discov. 7(4), e1207 (2017)
4. Huynh Trieu, V., Le Quoc, H., Truong Ngoc, C.: An efficient algorithm for hiding sensitive-high utility itemsets. Intell. Data Anal. 24(4), 831–845 (2020)
5. Krishnamoorthy, S.: Pruning strategies for mining high utility itemsets. Expert Syst. Appl. 42(5), 2371–2381 (2015)