Proceedings of the 2011 ACM Symposium on Applied Computing 2011
DOI: 10.1145/1982185.1982395
|View full text |Cite
|
Sign up to set email alerts
|

Target-based privacy preserving association rule mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…In a different work [4], the TBDS algorithm is applied in conjunction with the DWT algorithm to prove that discrete wavelet transformation over changed data is viable because it generates highly accurate association rules and maintains data privacy when few changes occur between the source and the target. The approach used is called Wavelet Coefficient Maintenance (WCM).…”
Section:  Nmentioning
confidence: 99%
See 2 more Smart Citations
“…In a different work [4], the TBDS algorithm is applied in conjunction with the DWT algorithm to prove that discrete wavelet transformation over changed data is viable because it generates highly accurate association rules and maintains data privacy when few changes occur between the source and the target. The approach used is called Wavelet Coefficient Maintenance (WCM).…”
Section:  Nmentioning
confidence: 99%
“…Let the partition size be four rows per partition. The target database then stores on its space, tables of partition definition (Partition Information of S) 4 , and transformation (Transformed Dataset T) of the initial synchronization (Source Dataset S). A copy of the transformation with rows IDs pruned off (Miner's Transformed Dataset T) is exchanged with the miner.…”
Section: Target-based Privatized Incremental Rule Update Algorithmmentioning
confidence: 99%
See 1 more Smart Citation