期刊文献+

基于数据清洗方法的敏感规则隐藏问题研究

原文传递
导出
摘要 隐私保护数据挖掘(Privacy Preserving Data Mining,以下简称PPDM)的目标是要寻找到一种数据集的清洗方法,使得敏感数据或者敏感知识在实施数据挖掘的过程中不被发现。近年来国外研究学者在该领域提出了大量算法,本文着重以数据扰乱技术为主,结合目前的研究热点对敏感关联规则的隐藏方法的发展情况进行详细介绍,并给出算法的评价指标,最后指出敏感关联规则隐藏方法在未来研究的发展方向。
作者 徐辰晖
出处 《信息与电脑(理论版)》 2012年第10期70-73,共4页 China Computer & Communication
  • 相关文献

参考文献10

  • 1刘彬,孟凡荣,汪楚娇.基于兴趣度的隐私保护关联规则挖掘算法[J].计算机工程与设计,2011,32(6):2124-2128. 被引量:2
  • 2Verykios VS,Elmagarmid AK,Bertino E,et al.Association rule hiding[].IEEE Transactions of Knowledge and Data Engineering.2004 被引量:1
  • 3Agrawal R,Imielinski T,Swami A.Mining association rules between sets of items in large databases[].Proceedings of the ACM SIGMOD Conference on Management ofdata.1993 被引量:1
  • 4Oliveira S R M,,Zaiane O R.Protecting sensitive knowledge bydata sanitation[].Proc of the rd Int’’ Conf on Data Mining.2003 被引量:1
  • 5Oliveira S R M,Zaiane O R.Algorithms for Balancing Privacy and KnowledgeDiscovery in Association Rule Mining[]..2003 被引量:1
  • 6Vassilios S. Veyrkios,Elisa Bertino,Igor Nai Fovino.State-of-the in Privacy Preserving Data Mining[].ACM SIGMOD Record.2004 被引量:1
  • 7M.Atallah,E.Bertino,A.Elmagarmid,M.Ibrahim,V.S.Verykios.Disclosure Limitation of Sensitive Rules[].Procof the IEEEWorkshop on Knowledge and Data Engineering Exchange.1999 被引量:1
  • 8Oliveira SRM,Za ane OR.Privacy Preserving Frequent ItemsetMining[].Proceedings of the lEEE International Conference on PrivacySecurity and Data Mining (PSDM’’).2002 被引量:1
  • 9Chih-Chia Weng,Shan-Tai Chen,Hung-Che Lo.A NovelAlgorithm for Completely Hiding Sensitive Association Rules[].Procof the th International Conference on Intelligent Systems Design andApplications.2008 被引量:1
  • 10Chirag N Modi,Udai Pratap Rao,Dhiren R.Patel.Maintaining Privacy and Data Quality in Privacy Preserving AssociationRule Mining[].Procof the nd International conference on ComputingCommunication and Networking Technologies.2010 被引量:1

二级参考文献16

  • 1Oliveira S R M,Zaiane O R.A unified framework for protecting sensitive association rules in business collaboration[J].Intemational Journal of Business Intelligence and Data Mining,2006,1 (3):247-287. 被引量:1
  • 2Janaki B Ramaiah,Dr A Rama Mohan Reddy, kamala Kumari M. Parallel privacy preserving association rule mining on pc clusters [C]. IEEE International Advance Computing Conference, 2009:1538-1542. 被引量:1
  • 3Zaki M J, Hsiao C J. Efficient algorithms for mining closed itemsets and their lattice structure [J]. IEEE Transactions on Knowledge and Data Engineering,2005,17:462-478. 被引量:1
  • 4Oliveira S R M,Zaiane O R.Protecting sensitive knowledge by data sanitation[C].Proc of the 3rd Int'l Conf on Data Mining. IEEE Computer Society,2003:613-616. 被引量:1
  • 5Verykios V S, Elmagarmid A, Bertino E, et al. Association rule hiding [J]. IEEE Trans on Knowledge and Data Engineering, 2004,16(4) :434-447. 被引量:1
  • 6Zhang Xiaoming.Knowledge hiding in data mining by transaction adding and removing [C]. 31 st Annual International Computer Software and Applications Conference,2007:273-274. 被引量:1
  • 7Wu Chieh-Ming, Huang Yin-Fu.An efficient data structure for mining generalized association rules [C]. The 5th International Conference on Fuzzy Systems and Knowledge Discovery,2008: 565-571. 被引量:1
  • 8Sun Wei,Wang Yonggui.Association rule mining algorithm based on Privacy preserving [C].Computer and Automation Engineering,2010:140-143. 被引量:1
  • 9郭宇红,童云海,唐世渭,杨冬青.数据库中的知识隐藏[J].软件学报,2007,18(11):2782-2799. 被引量:14
  • 10张瑞,郑诚,陈娟娟.一种简单的基于隐私保护的关联规则挖掘方法[J].计算机工程与应用,2008,44(28):130-132. 被引量:6

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部