2022
DOI: 10.3390/app12042131
|View full text |Cite
|
Sign up to set email alerts
|

A Graph-Based Differentially Private Algorithm for Mining Frequent Sequential Patterns

Abstract: Currently, individuals leave a digital trace of their activities when they use their smartphones, social media, mobile apps, credit card payments, Internet surfing profile, etc. These digital activities hide intrinsic usage patterns, which can be extracted using sequential pattern algorithms. Sequential pattern mining is a promising approach for discovering temporal regularities in huge and heterogeneous databases. These sequences represent individuals’ common behavior and could contain sensitive information. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Laeuchli et al [123] developed a centrality measurement method in large-scale G. The proposed method has abilities to compute three types of centralities, such as Laplacian, eigenvector, and closeness centralities, from G. A new and low-cost subgraph counting method based on fuzzy set theory for SN data was developed by Hou et al [124]. Nunez et al [125] developed a privacy-aware frequent sequential patterns mining method from large-scale G with applications to recommender systems. Further information about privacy-aware graph computing methods can be obtained from the book chapters and reviews in [126,127].…”
Section: Privacy-aware Graph Computing Methodsmentioning
confidence: 99%
“…Laeuchli et al [123] developed a centrality measurement method in large-scale G. The proposed method has abilities to compute three types of centralities, such as Laplacian, eigenvector, and closeness centralities, from G. A new and low-cost subgraph counting method based on fuzzy set theory for SN data was developed by Hou et al [124]. Nunez et al [125] developed a privacy-aware frequent sequential patterns mining method from large-scale G with applications to recommender systems. Further information about privacy-aware graph computing methods can be obtained from the book chapters and reviews in [126,127].…”
Section: Privacy-aware Graph Computing Methodsmentioning
confidence: 99%