GA-based Approach for Hiding Sensitive Itemsets by Transaction Insertion

被引:0
|
作者
Lin, Chun-Wei [1 ]
Hong, Tzung-Pei [2 ,4 ]
Chang, Chia-Ching [2 ]
Wang, Shyue-Liang [3 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Sch Comp Sci & Technol, IIIRC, Shenzhen 518055, Peoples R China
[2] Natl Univ Kaohsiung, Dept Comp Sci & Informat Engn, Kaohsiung 811, Taiwan
[3] Natl Univ Kaohsiung, Dept Informat Management, Kaohsiung 811, Taiwan
[4] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
关键词
Privacy preservation; Data mining; Genetic algorithm; Pre-large concept; Evolutionary computation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data mining technology is used to derive useful knowledge from large databases to aid corporate decision-making. The process of data collection and dissemination may, however, cause privacy concerns. Thus, privacy-preserving data mining (PPDM) has become an important issue. In this paper, an evolutionary privacy -preserving data mining method is proposed for finding appropriate itemsets within inserted transactions while hiding sensitive itemsets. An experiment is conducted to evaluate the performance of the proposed approach.
引用
收藏
页码:3 / 9
页数:7
相关论文
共 50 条
  • [31] A GA-BASED APPROACH TO OPTIMIZING COMBINATIONAL QUERIES IN SCDL
    Ying, Weiqin
    Li, Yuanxiang
    Sheu, Phillip C-Y.
    INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2008, 2 (02) : 273 - 289
  • [32] Efficiently Updating the Discovered Multiple Fuzzy Frequent Itemsets with Transaction Insertion
    Jerry Chun-Wei Lin
    Yuyu Zhang
    Philippe Fournier-Viger
    Tzung-Pei Hong
    International Journal of Fuzzy Systems, 2018, 20 : 2440 - 2457
  • [33] Parallel GA-based approach for microwave imaging applications
    Massa, A
    Franceschini, D
    Franceschini, G
    Pastorino, M
    Raffetto, M
    Donelli, M
    IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2005, 53 (10) : 3118 - 3127
  • [34] An Evolutionary GA-Based Approach for Community Detection in IoT
    Mishra, Sanket
    Hota, Chinmay
    Kumar, Lov
    Nayak, Abhaya
    IEEE ACCESS, 2019, 7 : 100512 - 100534
  • [35] A GA-based nearly optimal image authentication approach
    Chen, Chien-Chang
    Lin, Cheng-Shian
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2007, 3 (03): : 631 - 640
  • [36] GA-based approach to pitch recognition of musical consonance
    Natsui, Masanori
    Kubo, Shunichi
    Tadokoro, Yoshiaki
    ICINCO 2006: Proceedings of the Third International Conference on Informatics in Control, Automation and Robotics: SIGNAL PROCESSING, SYSTEMS MODELING AND CONTROL, 2006, : 47 - 52
  • [37] Efficiently Updating the Discovered Multiple Fuzzy Frequent Itemsets with Transaction Insertion
    Lin, Jerry Chun-Wei
    Zhang, Yuyu
    Fournier-Viger, Philippe
    Hong, Tzung-Pei
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2018, 20 (08) : 2440 - 2457
  • [38] Two new techniques for hiding sensitive itemsets and their empirical evaluation
    HajYasien, Ahmed
    Estivill-Castro, Vladimir
    DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4081 : 302 - 311
  • [39] An efficient algorithm for hiding sensitive-high utility itemsets
    Trieu, Vy Huynh
    Quoc, Hai Le
    Ngoc, Chau Truong
    INTELLIGENT DATA ANALYSIS, 2020, 24 (04) : 831 - 845
  • [40] A max-min approach for hiding frequent itemsets
    Moustakides, George V.
    Verykios, Vassilios S.
    ICDM 2006: SIXTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, WORKSHOPS, 2006, : 502 - +