GA-based Approach for Hiding Sensitive Itemsets by Transaction Insertion

被引:0
|
作者
Lin, Chun-Wei [1 ]
Hong, Tzung-Pei [2 ,4 ]
Chang, Chia-Ching [2 ]
Wang, Shyue-Liang [3 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Sch Comp Sci & Technol, IIIRC, Shenzhen 518055, Peoples R China
[2] Natl Univ Kaohsiung, Dept Comp Sci & Informat Engn, Kaohsiung 811, Taiwan
[3] Natl Univ Kaohsiung, Dept Informat Management, Kaohsiung 811, Taiwan
[4] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
关键词
Privacy preservation; Data mining; Genetic algorithm; Pre-large concept; Evolutionary computation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data mining technology is used to derive useful knowledge from large databases to aid corporate decision-making. The process of data collection and dissemination may, however, cause privacy concerns. Thus, privacy-preserving data mining (PPDM) has become an important issue. In this paper, an evolutionary privacy -preserving data mining method is proposed for finding appropriate itemsets within inserted transactions while hiding sensitive itemsets. An experiment is conducted to evaluate the performance of the proposed approach.
引用
收藏
页码:3 / 9
页数:7
相关论文
共 50 条
  • [21] Incrementally Updating High-Utility Itemsets with Transaction Insertion
    Lin, Jerry Chun-Wei
    Gan, Wensheng
    Hong, Tzung-Pei
    Pan, Jeng-Shyang
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2014, 2014, 8933 : 44 - 56
  • [22] A GA-based NN approach for makespan estimation
    Li, Shujuan
    Li, Yan
    Liu, Yong
    Xu, Yuefei
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (02) : 1003 - 1014
  • [23] Hiding Sensitive Itemsets Using Sibling Itemset Constraints
    Yildiz, Baris
    Kut, Alp
    Yilmaz, Reyat
    SYMMETRY-BASEL, 2022, 14 (07):
  • [24] GA-based approach to discover meaningful biclusters
    Aguilar-Ruiz, Jesus S.
    Divina, Federico
    GECCO 2005: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOLS 1 AND 2, 2005, : 473 - 474
  • [25] Hiding Association Rules based on Relative-non-sensitive Frequent Itemsets
    Li, Xueming
    Liu, Zhijun
    Zuo, Chuan
    PROCEEDINGS OF THE 8TH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, 2009, : 384 - +
  • [26] A TRADEOFF BALANCING ALGORITHM FOR HIDING SENSITIVE FREQUENT ITEMSETS
    Gokce, Harun
    Abul, Osman
    KDIR 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND INFORMATION RETRIEVAL, 2010, : 200 - 205
  • [27] Hiding Sensitive High Utility and Frequent Itemsets Based on Constrained Intersection Lattice
    Huynh Trieu Vy
    Le Quoc Hai
    Nguyen Thanh Long
    Truong Ngoc Chau
    Le Quoc Hieu
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (01) : 3 - 23
  • [28] A Change Would Do You Good: GA-Based Approach for Hiding Data in Program Executables Extended Abstract
    Gabrys, Ryan
    Martinez, Luis
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 285 - 286
  • [29] A GA-Based Approach for FMS Machine Loading Planing
    杨红红
    HighTechnologyLetters, 2001, (03) : 64 - 69
  • [30] A GA-based approach for solving fuzzy project scheduling
    Liu, Yan
    Zhao, Sheng-Li
    Zhang, Xi-Ping
    Du, Guang-Qian
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3153 - +