|
[1]M. Kantarcioglu and W. Jiang, “Incentive compatible privacy-preserving data analysis,” IEEE Trans. on Knowledge and Data Eng., vol. 25, no. 6, pp.1323-1335, June 2013. [2]S. D. Patel and S. Tiwari, “Privacy preserving data mining,” International Journal of Computer Science and Information Technologies, vol. 4, no. 1, pp.139-141, May 2013. [3]F. Giannotti, L.V. S. Lakshmanan, A. Monreale, D. Pedreschi and H.W. Wang, “Privacy-preserving mining of association rules from outsourced transaction databases,” IEEE Systems Journal., vol. 7, no. 3, pp.385-395, September 2013. [4]M.L. Gonzales, K. Bagchi, G. Udo and P. Kirs, “Diffusion of business intelligence and data warehousing: an exploratory investigation of research and practice,” in Proc. 44th Hawaii Int. Conf. on System Sciences (HICSS), Kauai, Hawaii, pp.1-9, January 2011. [5]T. Sirole and J. Choudhary, “A survey of various methodologies for hiding sensitive association rules,” Int. Journal of Computer Applications, vol. 96, no.18, pp.12-15, June 2014. [6]S. M. Darwish, M. M. Madbouly and M. A. El-Hakeem, “A database sanitizing algorithm for hiding sensitive multilevel association rule mining,” Int. Journal of Computer and Communication Engineering, vol. 3, no. 4, pp.285-293, July 2014. [7]L. Qiu, Y. Li, and X. Wu, “Protecting business intelligence and customer privacy while outsourcing data mining tasks,” Knowledge and Inform. Syst., vol. 17, no. 1, pp.99-120, October 2008. [8]X. Huang, J. K. Liu, S. Tang, Y. Xiang, K. Liang, L. Xu and J. Zhou, “Cost-effective authentic and anonymous data sharing with forward security,” IEEE Transactions on Computers, vol. 64, no. 4, pp.971-983, April 2015. [9]R. V. Prakash, A. Govardhan and S. S. V. N. Sarma, “Discovering non-redundant association rules using minmax approximation rules,” Indian Journal of Computer Science and Engineering, vol. 3 no.6, pp.796-802, Jan. 2013. [10]L. Xu, C. Jiang, J. Wang, J. Yuan and Y. Ren, “Information security in big data: Privacy and data mining,” IEEE Access, vol. 2, pp.1149-1176, October 2014. [11]J. Vaidya, B. Shafiq, W. Fan, D. Mehmood and D. Lorenzi, “A random decision tree framework for privacy-preserving data mining,” IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 5, pp.399-411, October 2014. [12]L. Xu, C. Jiang, J. Wang, J. Yuan and Y. Ren, “Information security in big data: privacy and data mining,” IEEE Access, vol. 2, pp.1149-1176, October 2014. [13]S. Goryczka, L. Xiong and B. C. M. Fung, “m-Privacy for collaborative data publishing,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 10, pp.2520-2533, October 2014. [14]A. Gkoulalas-Divanis and V.S. Verykios, Association Rule Hiding for Data Mining, Springer, New York, USA, 2010. [15]C.N. Modi, V. Sardar, U.P. Rao and D.R. Patel, “Maintaining privacy and data quality in privacy preserving association rule mining.” in Proc. Int. Conference on Computing Communication and Networking Technologies, Karur, India, pp.1-6, July 2010. [16]K. Shah, A.Thakkar and A. Ganatra, “Association rule hiding by heuristic approach to reduce side effects and hide multiple right hand side items,” Int. Journal of Computer Applications, vol. 45, no.1, pp.12-15, May 2012. [17]S. Kasthuri and T. Meyyappan, “Detection of sensitive items in market basket database using association rule mining for privacy preserving,” in Proc. of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, Salem, USA, pp.200-203, February 2013. [18]N.H. Domadiya, and U.P. Rao, “Hiding sensitive association rules to maintain privacy and data quality in database,” in Proc. of the IEEE 3rd Conference International Advance Computing, Ghaziabad, India, pp.1306-1310, February 2013. [19]U. Srinivasan and B. Arunasalam, “Leveraging big data analytics to reduce healthcare costs,” IEEE IT Pro, vol. 15, no. 6, pp.21-28, December 2013. [20]J. Han, M. Kamber, and J. Pei, Data Mining: Concepts and Techniques, Morgan Kaufmann, 3rd ed., Waltham, USA, 2011 [21]J. Kaufmann and P. Chamoni, “Structuring collaborative business intelligence: a literature review,” in Proc. of 47th Hawaii Int. Conference on System Science, Waikoloa, Hawaii, pp.3738-3747, January 2014. [22]M. Miškuf and I. Zolotová, “Application of business intelligence solutions on manufacturing data,” in Proc. of IEEE 13th Int. Symposium on Applied Machine Intelligence and Informatics, Herl’any, Slovakia, pp.193-197, January 2015. [23]A. Metzger, P. Leitner, D. Ivanovi´c, E. Schmieders, R. Franklin, M. Carro, S. Dustdar and K. Pohl, “Comparing and combining predictive business process monitoring techniques,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 45, no. 2, pp.276-290, February 2015. [24]J. Neethu and W. Aswathy, “Data mining on social security and social welfare data,” Int. Journal of Scientific &; Engineering Research, vol. 5, issue 2, pp.1612-1614, February 2014. [25]K. Sathiyapriya and G. S. Sadasivam, “A survey on privacy preserving association rule mining,” Int. Journal on Data Mining Knowledge Management Process, vol. 3, no. 2, pp.119-130, March 2013. [26]D. Martin, A. Rosete, J. Alcala-Fdez and F. Herrera, “A new multiobjective evolutionary algorithm for mining a reduced set of interesting positive and negative quantitative association rules,” IEEE Transactions on Evolutionary Computation, vol. 18, no. 1, pp.54-69, February 2014. [27]N. R. Radadiya, N. B. Prajapati and K. H. Shah, “Privacy preserving in association rule mining,” Int. Journal of Agriculture Innovations and Research, vol. 2, issue 4, pp.208-213, October 2013. [28]A. Sabharwal, J. Suter, K. S. McKelvey, M. K. Schwartz and C. Montgomery, “Large landscape conservation—synthetic and real-world datasets,” in Proc. of the 27th AAAI Conference on Artificial Intelligence, Washington, USA, pp.1369-1372, July 2013. [29]W.Lu, G. Miklau and V. Gupta, “Generating private synthetic databases for untrusted system evaluation,” in Proc of the IEEE 30th International Conference on Data Engineering, Chicago, USA, pp.652-663, April 2014. [30]R. Agrawal and R. Srikant, “Fast algorithms for mining association rules in large databases,” in Proc. of the 20th Int. Conference on Very Large Data Bases, Santiago, Chile, pp.487-499, September 1994. [31]M. Hahsler, K. Hornik and T. Reutterer, “Implications of probabilistic data modeling for mining association rules,” in Proc. of the 29th Annual Conference of The Gesellschaft fur Klassifikation e.V, Magdeburg, Germany, pp.598-605, March 2005.
|