共 20 条
- [1] Sweeney L., K-anonymity: A model for protecting privacy, Int. J. on Uncertainty Fuzziness and Knowledge-based System, 10, 5, pp. 557-570, (2002)
- [2] Agrawal R., Srikant R., Fast algorithms for mining association rules, VLDB '94 Proc. of the 20th Int. Conf. on Very Large Data Bases, pp. 487-499, (1994)
- [3] Tai C.H., Yu P.S., Chen M.S., K-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining, Proc. of the 16th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 473-482, (2010)
- [4] Zhu Z., Du W., K-anonymous association rule hiding, Proc. of the 5th ACM Symp. on Information, Computer and Communications Security, pp. 305-309, (2010)
- [5] Narges J.G., Mohammad N.D., A survey on privacy preserving association rule mining, Advances in Computer Science: An Int. J., 4, 14, pp. 41-48, (2015)
- [6] Khyati B.J., Jignesh V., Dhiren R.P., A survey on association rule hiding methods, Int. J. of Computer Application, 82, 13, pp. 20-25, (2013)
- [7] Pawlak Z., Rough sets, Int. J. of Computer and Information Sciences, 11, 5, pp. 341-356, (1982)
- [8] Ytow N., Morse D.R., McL Roberts D., Rough set approximation as formal concept, J. Adv. Comput. Intell. Intell. Inform., 10, 5, pp. 606-611, (2006)
- [9] Yamaguchi N., Wu M., Nakata M., Sakai H., Application of rough set-based information analysis to questionnaire data, J. Adv. Comput. Intell. Intell. Inform., 18, 6, pp. 953-961, (2014)
- [10] Inuiguchi M., Washimi K., Improving rough set rule-based classification by supplementary rules, J. Adv. Comput. Intell. Intell. Inform., 19, 6, pp. 747-758, (2015)