1. Advances in Database Systems;CC Aggarwal,2008
2. Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference Very Large Databases VLDB, vol. 1215, pp. 487–499 (1994)
3. Amiri, A.: Dare to share: protecting sensitive knowledge with data sanitization. Decis. Support Syst. 43(1), 181–191 (2007)
4. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX 1999) (Cat. No. PR00453), pp. 45–52. IEEE (1999)
5. Cheng, P., Roddick, J.F., Chu, S.-C., Lin, C.-W.: Privacy preservation through a greedy, distortion-based rule-hiding method. Appl. Intell. 44(2), 295–306 (2015).
https://doi.org/10.1007/s10489-015-0671-0