Proceedings of the 2007 ACM Symposium on Applied Computing 2007
DOI: 10.1145/1244002.1244092
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving itemset mining through fake transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
33
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(33 citation statements)
references
References 9 publications
0
33
0
Order By: Relevance
“…A fake transaction randomization method is presented in (Abul, 2009). The method of (Lin and Liu, 2007) ensures the privacy of data by mixing real transactions with fake transactions. Another similar method is given by (Boora et al, 2009) where transaction randomization method is a combination of the fake transaction randomization method and a new per-transaction randomization method.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A fake transaction randomization method is presented in (Abul, 2009). The method of (Lin and Liu, 2007) ensures the privacy of data by mixing real transactions with fake transactions. Another similar method is given by (Boora et al, 2009) where transaction randomization method is a combination of the fake transaction randomization method and a new per-transaction randomization method.…”
Section: Related Workmentioning
confidence: 99%
“…Due to combinatorial nature of the problem of itemset hiding, proposed sanitization methodologies span from simple, time and memory efficient heuristics (Oliveira and Zaiane, 2002) (Oliveira and Zaiane, 2003a) (Verykios et al, 2004) (Amiri, 2007) (Wu et al, 2007) (Keer and Singh, 2012) (Yildiz and Ergenc, 2012), border-based approaches (Sun and Yu, 2005) (Sun and Yu, 2007) (Moustakides and Verykios, 2008) and reconstruction based approaches (Mielikainen, 2003) (Guo, 2007) (Lin and Liu, 2007) (Boora et al, 2009) (Mohaisen et al, 2010) to exact hiding (Menon et al, 2005) (Gkoulalas-Divanis and Verykios, 2006) (Gkoulalas-Divanis and Verykios, 2008) (Gkoulalas-Divanis andVerykios, 2009b) algorithms that offer guarantees on the quality of the computed hiding solution at an increased computational complexity cost. Whatever the technique used in sanitiza-tion; different attributes are used in selecting the transaction, itemset in the transaction or the item in the itemset to modify.…”
Section: Introductionmentioning
confidence: 99%
“…An itemset is frequent if its support is greater than a threshold value. [18]: Let A be a set of n items where I = {a 1 , a 2 , a 3 . .…”
Section: Fsmentioning
confidence: 99%
“…In another work (referred as FS), Lin et al used fake transactions to anonymize original data transactions for PP-ARM [18]. The FS has several advantages over other existing schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation