Privacy preserving itemset mining through fake transactions.
Jun-Lin LinJulie Yu-Chih LiuPublished in: SAC (2007)
Keyphrases
- privacy preserving
- itemset mining
- itemsets
- frequent itemsets
- privacy preserving data mining
- constraint programming
- privacy preservation
- vertically partitioned data
- frequent itemset mining
- frequent closed itemsets
- scalar product
- graph mining
- sensitive information
- private information
- data privacy
- database
- pattern mining
- sequential pattern mining
- differential privacy
- secure multiparty computation
- privacy protection
- privacy sensitive
- privacy concerns
- data analysis
- machine learning
- data mining problems
- association rule mining
- data mining
- database systems
- databases