Results 1 to 10 of about 2,277 (164)
Multi-level high utility-itemset hiding. [PDF]
Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. High-utility itemset mining (HUIM) is an extension to frequent itemset mining (FIM) which deals with business ...
Nguyen LTT, Duong H, Mai A, Vo B.
europepmc +4 more sources
Mining Locally Trending High Utility Itemsets [PDF]
High utility itemset mining consists of identifying all the sets of items that appear together and yield a high profit in a customer transaction database. Recently, this problem was extended to discover trending high utility itemsets (itemsets that yield an increasing or decreasing profit over time).
Fournier-Viger P +3 more
europepmc +3 more sources
Efficient chain structure for high-utility sequential pattern mining [PDF]
High-utility sequential pattern mining (HUSPM) is an emerging topic in data mining, which considers both utility and sequence factors to derive the set of high-utility sequential patterns (HUSPs) from the quantitative databases.
Djenouri, Youcef +4 more
core +4 more sources
An Evolutionary Algorithm to Mine High-Utility Itemsets [PDF]
High-utility itemset mining (HUIM) is a critical issue in recent years since it can be used to reveal the profitable products by considering both the quantity and profit factors instead of frequent itemset mining (FIM) of association rules (ARs). In this
Jaroslav Frnda +5 more
core +2 more sources
Approximate Parallel High Utility Itemset Mining [PDF]
High utility itemset mining discovers itemsets whose utility is above a given threshold, where the utility measures the importance of an itemset. It overcomes the limitation of frequent pattern mining, which uses frequency as its quality measure. To speed up the performance for mining high utility itemsets, many algorithms have been proposed which ...
Yan Chen, Aijun An
openaire +1 more source
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven +16 more
core +2 more sources
A log mining approach for process monitoring in SCADA [PDF]
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when
Bolzoni, Damiano +2 more
core +4 more sources
Flexible constrained sampling with guarantees for pattern mining [PDF]
Pattern sampling has been proposed as a potential solution to the infamous pattern explosion. Instead of enumerating all patterns that satisfy the constraints, individual patterns are sampled proportional to a given quality measure.
A Giacometti +15 more
core +3 more sources
Mining Frequent Graph Patterns with Differential Privacy [PDF]
Discovering frequent graph patterns in a graph database offers valuable information in a variety of applications. However, if the graph dataset contains sensitive data of individuals such as mobile phone-call graphs and web-click graphs, releasing ...
Geweke J. +5 more
core +1 more source

