×
This paper proposes three heuristic-based algorithms, namely Selecting the Most Real item sensitive utility First (SMRF), Selecting the Least Real item ...
Sep 1, 2023 · The primary objective of PPUM algorithms is to conceal the sensitive knowledge that can be found via the application of utility mining ...
Oct 22, 2024 · HUIM algorithms can discover the most beneficial itemsets in transaction databases, namely the high-utility itemsets (HUIs), in contrast to ...
Oct 22, 2024 · Lin et al. (2016) [7] proposed two algorithms MSU-MAU and MSU-MUI to protect high utility itemsets. Both of these algorithms choose the ...
Jul 1, 2020 · The purpose of SHUI hiding algorithm is to conceal the set of SHUIs while minimizing the side effects which caused by data distortion process.
The proposed algorithms are designed to efficiently delete SHUIs or decrease their utilities using the concepts of maximum and minimum utility. A projection ...
Privacy preserving data mining is an approach to develop algorithms by which we can modify the utility values of original data using some techniques in order to.
In this paper, a novel hiding-missing-artificial utility (HMAU) algorithm is proposed to hide sensitive itemsets through transaction deletion.
This study focuses on Privacy. Preserving Utility Mining (PPUM) and presents two novel algorithms, HHUIF and MSICF, to achieve the goal of hiding sensitive ...
A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high ...