Journal articles on the topic 'SENSITIVE RULES'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SENSITIVE RULES.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Full textBansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Full textSuma, B., and G. Shobha. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451–58. https://doi.org/10.11591/ijece.v11i4.pp3451-3458.
Full textNguyen, Khac-Chien. "Mining Association Rules on Time-sensitive Data." ICT Research 2024, no. 2 (2024): 130–40. http://dx.doi.org/10.32913/mic-ict-research.v2024.n2.1256.
Full textWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Full textRao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Full textWhittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Full textDiwan, Abhishek, and Alpana Singh. "An Efficient Technique for Protecting Sensitive Information." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 03 (2013): 79–82. https://doi.org/10.5281/zenodo.14594519.
Full textAlayiaboozar, Elham. "Studying the possibility of improving the function of a POS tagger system." Comparative Linguistic Research 10, no. 19 (2020): 95–110. https://doi.org/10.22084/RJHLL.2019.16614.1834.
Full textHameed, S., F. Shahzad, and S. Asghar. "SANITIZING SENSITIVE ASSOCIATION RULES USING FUZZY CORRELATION SCHEME." Nucleus 50, no. 4 (2013): 359–67. https://doi.org/10.71330/thenucleus.2013.739.
Full textGayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Full textWang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Full textJain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)." International Journal of Artificial Intelligence & Applications 3, no. 2 (2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.
Full textBonam, Janakiramaiah, and Ramamohan Reddy. "Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment." International Journal of Information Security and Privacy 8, no. 3 (2014): 39–62. http://dx.doi.org/10.4018/ijisp.2014070103.
Full textMohan, S. Vijayarani, and Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining." International Journal of Information Security and Privacy 12, no. 3 (2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.
Full textMenon, Syam, Abhijeet Ghoshal, and Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules." Information Systems Research 33, no. 1 (2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.
Full textWu, Yi-hung, Chia-ming Chiang, and Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects." IEEE Transactions on Knowledge and Data Engineering 19, no. 1 (2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.
Full textDehkordi, Mohammad Naderi, Kambiz Badie, and Ahmad Khadem Zadeh. "A new approach for sensitive association rules hiding." International Journal of Rapid Manufacturing 1, no. 2 (2009): 128. http://dx.doi.org/10.1504/ijrapidm.2009.029379.
Full textSchmid-Hempel, Paul, and Regula Schmid-Hempel. "Nectar-collecting bees use Distance-sensitive movement rules." Animal Behaviour 34, no. 2 (1986): 605–7. http://dx.doi.org/10.1016/s0003-3472(86)80131-2.
Full textZwicky, Arnold M., Ellen M. Kaisse, and Michael Kenstowicz. "The phonology and syntax of wh-expressions in Tangale." Phonology Yearbook 4, no. 1 (1987): 229–41. http://dx.doi.org/10.1017/s0952675700000841.
Full textBoddez, Yannick, Marc Patrick Bennett, Silke van Esch, and Tom Beckers. "Bending rules: the shape of the perceptual generalisation gradient is sensitive to inference rules." Cognition and Emotion 31, no. 7 (2016): 1444–52. http://dx.doi.org/10.1080/02699931.2016.1230541.
Full textKrishnamoorthy, Sathiyapriya, G. Sudha Sadasivam, M. Rajalakshmi, K. Kowsalyaa, and M. Dhivya. "Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization." International Journal of Intelligent Information Technologies 13, no. 2 (2017): 1–20. http://dx.doi.org/10.4018/ijiit.2017040101.
Full textB., Suma, and Shobha G. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451. http://dx.doi.org/10.11591/ijece.v11i4.pp3451-3458.
Full textKhuda Bux, Naadiya, Mingming Lu, Jianxin Wang, Saajid Hussain, and Yazan Aljeroudi. "Efficient Association Rules Hiding Using Genetic Algorithms." Symmetry 10, no. 11 (2018): 576. http://dx.doi.org/10.3390/sym10110576.
Full textZhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules." Journal of Education, Humanities and Social Sciences 14 (May 30, 2023): 256–62. http://dx.doi.org/10.54097/ehss.v14i.8847.
Full textZhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules." Journal of Education, Humanities and Social Sciences 14 (May 30, 2023): 127–33. http://dx.doi.org/10.54097/ehss.v14i.8806.
Full textAli, Munawar. "Sustainability Index of Benoa Bay Beach Reclamation Against National Resistance." INFLUENCE: INTERNATIONAL JOURNAL OF SCIENCE REVIEW 5, no. 2 (2023): 43–62. http://dx.doi.org/10.54783/influencejournal.v5i2.135.
Full textIqbal, Khalid, Dr Sohail Asghar, and Dr Abdulrehman Mirza. "Hiding Sensitive XML Association Rules With Supervised Learning Technique." Intelligent Information Management 03, no. 06 (2011): 219–29. http://dx.doi.org/10.4236/iim.2011.36027.
Full textClymer, John R., David J. Cheng, and Daniel Hernandez. "Induction of decision making rules for context sensitive systems." SIMULATION 59, no. 3 (1992): 198–206. http://dx.doi.org/10.1177/003754979205900308.
Full textBarca, Laura, Andrew W. Ellis, and Cristina Burani. "Context-sensitive rules and word naming in Italian children." Reading and Writing 20, no. 5 (2006): 495–509. http://dx.doi.org/10.1007/s11145-006-9040-z.
Full textTalebi, Behnam, and Mohammad Naderi Dehkordi. "Sensitive association rules hiding using electromagnetic field optimization algorithm." Expert Systems with Applications 114 (December 2018): 155–72. http://dx.doi.org/10.1016/j.eswa.2018.07.031.
Full textMary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.
Full textKAPLAN, ABBY. "How much homophony is normal?" Journal of Linguistics 47, no. 3 (2011): 631–71. http://dx.doi.org/10.1017/s0022226711000053.
Full textLe, Bac, Lien Kieu, and Dat Tran. "DISTORTION-BASED HEURISTIC METHOD FOR SENSITIVE ASSOCIATION RULE HIDING." Journal of Computer Science and Cybernetics 35, no. 4 (2019): 337–54. http://dx.doi.org/10.15625/1813-9663/35/4/14131.
Full textB., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1137–45. https://doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.
Full textB., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1137. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.
Full textQuoc Le, Hai, Somjit Arch-int, and Ngamnij Arch-int. "Association Rule Hiding Based on Intersection Lattice." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/210405.
Full textYi, Tong, and Minyong Shi. "Privacy Protection Method for Multiple Sensitive Attributes Based on Strong Rule." Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/464731.
Full textFelando, Cynthia. "Breaking the rules of the game." Short Film Studies 9, no. 2 (2019): 157–60. http://dx.doi.org/10.1386/sfs.9.2.157_1.
Full textJiang, Ying, Ming Jing, Jie Zeng, Feng Qi Shen, Du Lan Qi, and Li Hua Wang. "LanguageTool Based Proofreading of Sensitive Chinese Political Information." Applied Mechanics and Materials 687-691 (November 2014): 2644–47. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2644.
Full textWhittle, Peter. "The risk-sensitive certainty equivalence principle." Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.2307/3214366.
Full textWhittle, Peter. "The risk-sensitive certainty equivalence principle." Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.1017/s0021900200117218.
Full textZwicky, Arnold M., Ellen M. Kaisse, Elizabeth A. Cowper, and Keren D. Rice. "Are phonosyntactic rules necessary?" Phonology Yearbook 4, no. 1 (1987): 185–94. http://dx.doi.org/10.1017/s0952675700000816.
Full textNegus, Oliver J., Andrew Dunn, and William Ridsdill-Smith. "Lower limb acute joint injuries: when to refer for X-ray?" British Journal of Hospital Medicine 81, no. 3 (2020): 1–5. http://dx.doi.org/10.12968/hmed.2020.0055.
Full textDOMINGO-FERRER, JOSEP, and VICENÇ TORRA. "A CRITIQUE OF THE SENSITIVITY RULES USUALLY EMPLOYED FOR STATISTICAL TABLE PROTECTION." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, no. 05 (2002): 545–56. http://dx.doi.org/10.1142/s0218488502001636.
Full textJing Yang, Junwei Zhang, Jianpei Zhang, and Lejun Zhang. "Blocking Inference Channels of Sensitive Rules in Data Stream Mining." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 7 (2013): 196–203. http://dx.doi.org/10.4156/aiss.vol5.issue7.24.
Full textSirole, Tapan, and Jaytrilok Choudhary. "A Survey of Various Methodologies for Hiding Sensitive Association Rules." International Journal of Computer Applications 96, no. 18 (2014): 12–15. http://dx.doi.org/10.5120/16893-6942.
Full textPatel, Deepak, and Vineet Richhariya. "C Privacy Prevention of Discriminating Rules by Perturbing Sensitive Items." Communications on Applied Electronics 2, no. 8 (2015): 12–16. http://dx.doi.org/10.5120/cae2015651825.
Full textRajalakshmi, M., and T. Purusothaman. "Concealing party-centric sensitive rules in a centralized data source." International Journal of Machine Learning and Cybernetics 4, no. 5 (2012): 515–25. http://dx.doi.org/10.1007/s13042-012-0111-y.
Full textZhao, Mingjun. "Optimal simple rules in RE models with risk sensitive preferences." Economics Letters 97, no. 3 (2007): 260–66. http://dx.doi.org/10.1016/j.econlet.2007.03.004.
Full text