Results 1 to 10 of about 2,277 (164)

Multi-level high utility-itemset hiding. [PDF]

open access: yesPLoS One
Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. High-utility itemset mining (HUIM) is an extension to frequent itemset mining (FIM) which deals with business ...
Nguyen LTT, Duong H, Mai A, Vo B.
europepmc   +4 more sources

Mining Locally Trending High Utility Itemsets [PDF]

open access: yesAdvances in Knowledge Discovery and Data Mining24th Pacific-Asia Conference, 2020
High utility itemset mining consists of identifying all the sets of items that appear together and yield a high profit in a customer transaction database. Recently, this problem was extended to discover trending high utility itemsets (itemsets that yield an increasing or decreasing profit over time).
Fournier-Viger P   +3 more
europepmc   +3 more sources

Efficient chain structure for high-utility sequential pattern mining [PDF]

open access: yes, 2020
High-utility sequential pattern mining (HUSPM) is an emerging topic in data mining, which considers both utility and sequence factors to derive the set of high-utility sequential patterns (HUSPs) from the quantitative databases.
Djenouri, Youcef   +4 more
core   +4 more sources

Towards Target High-Utility Itemsets

open access: yes, 2022
Preprint.
Miao, Jinbao   +4 more
openaire   +2 more sources

An Evolutionary Algorithm to Mine High-Utility Itemsets [PDF]

open access: yes, 2015
High-utility itemset mining (HUIM) is a critical issue in recent years since it can be used to reveal the profitable products by considering both the quantity and profit factors instead of frequent itemset mining (FIM) of association rules (ARs). In this
Jaroslav Frnda   +5 more
core   +2 more sources

Approximate Parallel High Utility Itemset Mining [PDF]

open access: yesBig Data Research, 2016
High utility itemset mining discovers itemsets whose utility is above a given threshold, where the utility measures the importance of an itemset. It overcomes the limitation of frequent pattern mining, which uses frequency as its quality measure. To speed up the performance for mining high utility itemsets, many algorithms have been proposed which ...
Yan Chen, Aijun An
openaire   +1 more source

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]

open access: yes, 2019
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven   +16 more
core   +2 more sources

A log mining approach for process monitoring in SCADA [PDF]

open access: yes, 2012
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when
Bolzoni, Damiano   +2 more
core   +4 more sources

Flexible constrained sampling with guarantees for pattern mining [PDF]

open access: yes, 2017
Pattern sampling has been proposed as a potential solution to the infamous pattern explosion. Instead of enumerating all patterns that satisfy the constraints, individual patterns are sampled proportional to a given quality measure.
A Giacometti   +15 more
core   +3 more sources

Mining Frequent Graph Patterns with Differential Privacy [PDF]

open access: yes, 2013
Discovering frequent graph patterns in a graph database offers valuable information in a variety of applications. However, if the graph dataset contains sensitive data of individuals such as mobile phone-call graphs and web-click graphs, releasing ...
Geweke J.   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy