Author:
Gkoulalas-Divanis Aris,Kagklis Vasileios,Stavropoulos Elias C.
Publisher
Springer International Publishing
Reference34 articles.
1. https://github.com/kagklis/Frequent-Itemset-Hiding-Toolbox-x86
2. IBM ILOG CPLEX User’s Manual v12.6
3. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD Conference, pp. 439–450 (2000)
4. Askari, M., Safavi-Naini, R., Barker, K.: An information theoretic privacy and utility measure for data sanitization mechanisms. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY 12), pp. 283–294 (2012)
5. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX 99), pp. 45–52 (1999)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Identify Risky Rules to Reduce Side Effects in Association Rule Hiding;Proceedings of the 32nd ACM International Conference on Information and Knowledge Management;2023-10-21