Efficient algorithms for victim item selection in privacy-preserving utility mining

S Jangra, D Toshniwal - Future Generation Computer Systems, 2022 - Elsevier
High-utility itemset mining has evolved as an essential and captivating research topic. It
aims to extract the patterns/itemsets having high utility value; hence, they are called high …

High-performance implementation of evolutionary privacy-preserving algorithm for big data using GPU platform

A Telikani, A Shahbahrami, AH Gandomi - Information Sciences, 2021 - Elsevier
Privacy protection has become a predominant concern in big data analysis. Privacy-
Preserving Association Rule Mining (PPARM) is a process in which original data is …

Frequent itemset hiding revisited: pushing hiding constraints into mining

VS Verykios, EC Stavropoulos, P Krasadakis… - Applied …, 2022 - Springer
This paper introduces a new theoretical scheme for the solution of the frequent itemset
hiding problem. We propose an algorithmic approach that consists of a novel constraint …

Enhancement oF an optimized key for database sanitization to ensure the security and privacy of an autism dataset

MM Rahman, RC Muniyandi, S Sahran, S Mohamed - Symmetry, 2021 - mdpi.com
Interrupting, altering, or stealing autism-related sensitive data by cyber attackers is a
lucrative business which is increasing in prevalence on a daily basis. Enhancing the security …

Securing Sensitive Medical Information with Basic and Pre-large Coati Optimization Algorithm for E-Health System Data Sanitation

M Madhavi, T Sasirooba, GK Kumar - Wireless Personal Communications, 2024 - Springer
Privacy preservation is increasingly crucial in e-Health systems, particularly within the realm
of privacy-preserving data mining, which aims to reveal underlying patterns while …

Metodología para el análisis de señales EEG por mapeo de regiones cerebrales para la salud mental

JE Calderón Reyes - 2023 - bdigital.dgse.uaa.mx
Mientras que las bioseñales EEG proveen un nivel de entendimiento respecto a la actividad
cerebral, métodos computacionales de Ingeniería de Software e Inteligencia Artificial …

SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data

S Sharma - … Conference on Advanced Network Technologies and …, 2023 - Springer
This paper introduces a spark-based fast solution for privacy-preserving frequent pattern
mining problems for big data. Spark Resilient Distributed Dataset (RDD) framework has …

Swapping-based data sanitization method for hiding sensitive frequent itemset in transaction database

D Gunawan, YS Nugroho - International Journal of …, 2021 - search.proquest.com
Sharing a transaction database with other parties for exploring valuable information
becomes more recognized by business institutions, ie, retails and supermarkets. It offers …

[PDF][PDF] Use of Data Mining to Identify Preferences for Humanistic Courses and Support the Management of University Extension of the Autonomous University of …

HM Bautista, MAO Esparza, JM Arteaga… - CISETC, 2023 - ceur-ws.org
Humanistic courses are a requirement of the Autonomous University of Aguascalientes for
all its students, who must take at least three courses from different disciplines during their …

[PDF][PDF] Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset. Symmetry 2021, 13, 1912

MM Rahman, RC Muniyandi, S Sahran, S Mohamed - 2021 - academia.edu
Interrupting, altering, or stealing autism-related sensitive data by cyber attackers is a
lucrative business which is increasing in prevalence on a daily basis. Enhancing the security …