2008
DOI: 10.1007/978-3-540-89197-0_27
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Heuristic Algorithm for Privacy Preserving of Associative Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…The suggested approach was taken into consideration by the authors for use in a number of fields of pattern mining, including maximum and closed, differential privacy, and anonymization. In an effort to stop the leaking of sensitive information, [18] created the FPUTT method, which is built on a tree structure and performs database perturbation. The sensitive item sets in this case are limited to the HUI mining technique for the specified transaction database.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The suggested approach was taken into consideration by the authors for use in a number of fields of pattern mining, including maximum and closed, differential privacy, and anonymization. In an effort to stop the leaking of sensitive information, [18] created the FPUTT method, which is built on a tree structure and performs database perturbation. The sensitive item sets in this case are limited to the HUI mining technique for the specified transaction database.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The MCCRT requires the CCR of each attribute to determine the order for generalization. In this article, instead of maintaining the CCRs in a list‐based structure as in Harnsamut and Natwichai (), a simple hash table is implemented to improve the efficiency. The attribute identifier along with its value will form a key for the hashing function, denoted as < A j , v > .…”
Section: Data Transformation Algorithmmentioning
confidence: 99%
“…And when the effect of the size of input dataset is investigated, we fix the k value at 20, and the size of the quasi‐identifier is set at the maximum value. We also report the execution time of the list‐based MCCRT proposed by Harnsamut and Natwichai () for comparison purposes.…”
Section: Experimental Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Such classification model works on support and confidence scheme as association rules [2], but having a designate attribute as class label. As the problem of privacy preserving for data mining has proven as an NP-hard when the optimal data quality is required, we propose to study the characteristics of a proven heuristic algorithm, Minimum Classification Correction Rate Transformation (MCCRT) [4] in the data incremental scenarios theoretically. Such heuristic algorithm can transform datasets both effectively and efficiently, i.e.…”
Section: Introductionmentioning
confidence: 99%