2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2021
DOI: 10.1109/trustcom53373.2021.00067
|View full text |Cite
|
Sign up to set email alerts
|

DP-gSpan: A Pattern Growth-based Differentially Private Frequent Subgraph Mining Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Periodic sequential pattern mining [20,21] is used to fnd patterns that occur frequently and periodically in long sequences. Subgraph mining [22,23] is another feld of sequential pattern mining, which aims to discover all frequent subgraphs in graph databases, the corresponding algorithms based on diferent data structures (such as liststructure [24], pattern-tree [25], and optimization algorithm [19]) are proposed to solve the related pattern mining problem from sequences database, and all these pattern mining approaches are based on the sequential database and the constraints threshold (selected by the user). Recently, Wang gives Miner-K [25] algorithm to mine the patterns with length constraints, and Nader proposes NEclat-Closed [24] to mine the closed pattern based on a vertical structure.…”
Section: Related Workmentioning
confidence: 99%
“…Periodic sequential pattern mining [20,21] is used to fnd patterns that occur frequently and periodically in long sequences. Subgraph mining [22,23] is another feld of sequential pattern mining, which aims to discover all frequent subgraphs in graph databases, the corresponding algorithms based on diferent data structures (such as liststructure [24], pattern-tree [25], and optimization algorithm [19]) are proposed to solve the related pattern mining problem from sequences database, and all these pattern mining approaches are based on the sequential database and the constraints threshold (selected by the user). Recently, Wang gives Miner-K [25] algorithm to mine the patterns with length constraints, and Nader proposes NEclat-Closed [24] to mine the closed pattern based on a vertical structure.…”
Section: Related Workmentioning
confidence: 99%