Publication | Closed Access
Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining
63
Citations
30
References
2016
Year
Privacy ProtectionEngineeringData ScienceData MiningInformation SecurityPrivacy ServicePrivacy-preserving Utility MiningData PrivacyFast AlgorithmsPrivacy SystemComputer ScienceSensitive High-utility ItemsetsPrivacyDifferential PrivacyData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1