Proceedings of the 2007 ACM Symposium on Applied Computing 2007
DOI: 10.1145/1244002.1244092
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving itemset mining through fake transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(39 citation statements)
references
References 9 publications
0
39
0
Order By: Relevance
“…A fake transaction randomization method is presented in (Abul, 2009). The method of (Lin and Liu, 2007) ensures the privacy of data by mixing real transactions with fake transactions. Another similar method is given by (Boora et al, 2009) where transaction randomization method is a combination of the fake transaction randomization method and a new per-transaction randomization method.…”
Section: Related Workmentioning
confidence: 99%
“…A fake transaction randomization method is presented in (Abul, 2009). The method of (Lin and Liu, 2007) ensures the privacy of data by mixing real transactions with fake transactions. Another similar method is given by (Boora et al, 2009) where transaction randomization method is a combination of the fake transaction randomization method and a new per-transaction randomization method.…”
Section: Related Workmentioning
confidence: 99%
“…An itemset is frequent if its support is greater than a threshold value. [18]: Let A be a set of n items where I = {a 1 , a 2 , a 3 . .…”
Section: Fsmentioning
confidence: 99%
“…By applying the support model in (1) on T , we obtain the frequent itemsets {m}, {c}, {b}, {j}, {m, b}, {c, b}, and {j, c} with supports [18]: The privacy is defined as the probability according to which the distorted data can be reconstructed.…”
Section: Definition 2 Support Of Itemsetmentioning
confidence: 99%
See 2 more Smart Citations