Artykuły w czasopismach na temat „SENSITIVE RULES”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „SENSITIVE RULES”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Pełny tekst źródłaBansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Pełny tekst źródłaSuma, B., and G. Shobha. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451–58. https://doi.org/10.11591/ijece.v11i4.pp3451-3458.
Pełny tekst źródłaNguyen, Khac-Chien. "Mining Association Rules on Time-sensitive Data." ICT Research 2024, no. 2 (2024): 130–40. http://dx.doi.org/10.32913/mic-ict-research.v2024.n2.1256.
Pełny tekst źródłaWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Pełny tekst źródłaRao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Pełny tekst źródłaWhittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Pełny tekst źródłaDiwan, Abhishek, and Alpana Singh. "An Efficient Technique for Protecting Sensitive Information." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 03 (2013): 79–82. https://doi.org/10.5281/zenodo.14594519.
Pełny tekst źródłaAlayiaboozar, Elham. "Studying the possibility of improving the function of a POS tagger system." Comparative Linguistic Research 10, no. 19 (2020): 95–110. https://doi.org/10.22084/RJHLL.2019.16614.1834.
Pełny tekst źródłaHameed, S., F. Shahzad, and S. Asghar. "SANITIZING SENSITIVE ASSOCIATION RULES USING FUZZY CORRELATION SCHEME." Nucleus 50, no. 4 (2013): 359–67. https://doi.org/10.71330/thenucleus.2013.739.
Pełny tekst źródłaGayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Pełny tekst źródłaWang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Pełny tekst źródłaJain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)." International Journal of Artificial Intelligence & Applications 3, no. 2 (2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.
Pełny tekst źródłaBonam, Janakiramaiah, and Ramamohan Reddy. "Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment." International Journal of Information Security and Privacy 8, no. 3 (2014): 39–62. http://dx.doi.org/10.4018/ijisp.2014070103.
Pełny tekst źródłaMohan, S. Vijayarani, and Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining." International Journal of Information Security and Privacy 12, no. 3 (2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.
Pełny tekst źródłaMenon, Syam, Abhijeet Ghoshal, and Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules." Information Systems Research 33, no. 1 (2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.
Pełny tekst źródłaWu, Yi-hung, Chia-ming Chiang, and Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects." IEEE Transactions on Knowledge and Data Engineering 19, no. 1 (2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.
Pełny tekst źródłaDehkordi, Mohammad Naderi, Kambiz Badie, and Ahmad Khadem Zadeh. "A new approach for sensitive association rules hiding." International Journal of Rapid Manufacturing 1, no. 2 (2009): 128. http://dx.doi.org/10.1504/ijrapidm.2009.029379.
Pełny tekst źródłaSchmid-Hempel, Paul, and Regula Schmid-Hempel. "Nectar-collecting bees use Distance-sensitive movement rules." Animal Behaviour 34, no. 2 (1986): 605–7. http://dx.doi.org/10.1016/s0003-3472(86)80131-2.
Pełny tekst źródłaZwicky, Arnold M., Ellen M. Kaisse, and Michael Kenstowicz. "The phonology and syntax of wh-expressions in Tangale." Phonology Yearbook 4, no. 1 (1987): 229–41. http://dx.doi.org/10.1017/s0952675700000841.
Pełny tekst źródłaBoddez, Yannick, Marc Patrick Bennett, Silke van Esch, and Tom Beckers. "Bending rules: the shape of the perceptual generalisation gradient is sensitive to inference rules." Cognition and Emotion 31, no. 7 (2016): 1444–52. http://dx.doi.org/10.1080/02699931.2016.1230541.
Pełny tekst źródłaKrishnamoorthy, Sathiyapriya, G. Sudha Sadasivam, M. Rajalakshmi, K. Kowsalyaa, and M. Dhivya. "Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization." International Journal of Intelligent Information Technologies 13, no. 2 (2017): 1–20. http://dx.doi.org/10.4018/ijiit.2017040101.
Pełny tekst źródłaB., Suma, and Shobha G. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451. http://dx.doi.org/10.11591/ijece.v11i4.pp3451-3458.
Pełny tekst źródłaKhuda Bux, Naadiya, Mingming Lu, Jianxin Wang, Saajid Hussain, and Yazan Aljeroudi. "Efficient Association Rules Hiding Using Genetic Algorithms." Symmetry 10, no. 11 (2018): 576. http://dx.doi.org/10.3390/sym10110576.
Pełny tekst źródłaZhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules." Journal of Education, Humanities and Social Sciences 14 (May 30, 2023): 256–62. http://dx.doi.org/10.54097/ehss.v14i.8847.
Pełny tekst źródłaZhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules." Journal of Education, Humanities and Social Sciences 14 (May 30, 2023): 127–33. http://dx.doi.org/10.54097/ehss.v14i.8806.
Pełny tekst źródłaAli, Munawar. "Sustainability Index of Benoa Bay Beach Reclamation Against National Resistance." INFLUENCE: INTERNATIONAL JOURNAL OF SCIENCE REVIEW 5, no. 2 (2023): 43–62. http://dx.doi.org/10.54783/influencejournal.v5i2.135.
Pełny tekst źródłaIqbal, Khalid, Dr Sohail Asghar, and Dr Abdulrehman Mirza. "Hiding Sensitive XML Association Rules With Supervised Learning Technique." Intelligent Information Management 03, no. 06 (2011): 219–29. http://dx.doi.org/10.4236/iim.2011.36027.
Pełny tekst źródłaClymer, John R., David J. Cheng, and Daniel Hernandez. "Induction of decision making rules for context sensitive systems." SIMULATION 59, no. 3 (1992): 198–206. http://dx.doi.org/10.1177/003754979205900308.
Pełny tekst źródłaBarca, Laura, Andrew W. Ellis, and Cristina Burani. "Context-sensitive rules and word naming in Italian children." Reading and Writing 20, no. 5 (2006): 495–509. http://dx.doi.org/10.1007/s11145-006-9040-z.
Pełny tekst źródłaTalebi, Behnam, and Mohammad Naderi Dehkordi. "Sensitive association rules hiding using electromagnetic field optimization algorithm." Expert Systems with Applications 114 (December 2018): 155–72. http://dx.doi.org/10.1016/j.eswa.2018.07.031.
Pełny tekst źródłaMary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.
Pełny tekst źródłaKAPLAN, ABBY. "How much homophony is normal?" Journal of Linguistics 47, no. 3 (2011): 631–71. http://dx.doi.org/10.1017/s0022226711000053.
Pełny tekst źródłaLe, Bac, Lien Kieu, and Dat Tran. "DISTORTION-BASED HEURISTIC METHOD FOR SENSITIVE ASSOCIATION RULE HIDING." Journal of Computer Science and Cybernetics 35, no. 4 (2019): 337–54. http://dx.doi.org/10.15625/1813-9663/35/4/14131.
Pełny tekst źródłaB., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1137–45. https://doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.
Pełny tekst źródłaB., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1137. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.
Pełny tekst źródłaQuoc Le, Hai, Somjit Arch-int, and Ngamnij Arch-int. "Association Rule Hiding Based on Intersection Lattice." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/210405.
Pełny tekst źródłaYi, Tong, and Minyong Shi. "Privacy Protection Method for Multiple Sensitive Attributes Based on Strong Rule." Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/464731.
Pełny tekst źródłaFelando, Cynthia. "Breaking the rules of the game." Short Film Studies 9, no. 2 (2019): 157–60. http://dx.doi.org/10.1386/sfs.9.2.157_1.
Pełny tekst źródłaJiang, Ying, Ming Jing, Jie Zeng, Feng Qi Shen, Du Lan Qi, and Li Hua Wang. "LanguageTool Based Proofreading of Sensitive Chinese Political Information." Applied Mechanics and Materials 687-691 (November 2014): 2644–47. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2644.
Pełny tekst źródłaWhittle, Peter. "The risk-sensitive certainty equivalence principle." Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.2307/3214366.
Pełny tekst źródłaWhittle, Peter. "The risk-sensitive certainty equivalence principle." Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.1017/s0021900200117218.
Pełny tekst źródłaZwicky, Arnold M., Ellen M. Kaisse, Elizabeth A. Cowper, and Keren D. Rice. "Are phonosyntactic rules necessary?" Phonology Yearbook 4, no. 1 (1987): 185–94. http://dx.doi.org/10.1017/s0952675700000816.
Pełny tekst źródłaNegus, Oliver J., Andrew Dunn, and William Ridsdill-Smith. "Lower limb acute joint injuries: when to refer for X-ray?" British Journal of Hospital Medicine 81, no. 3 (2020): 1–5. http://dx.doi.org/10.12968/hmed.2020.0055.
Pełny tekst źródłaDOMINGO-FERRER, JOSEP, and VICENÇ TORRA. "A CRITIQUE OF THE SENSITIVITY RULES USUALLY EMPLOYED FOR STATISTICAL TABLE PROTECTION." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, no. 05 (2002): 545–56. http://dx.doi.org/10.1142/s0218488502001636.
Pełny tekst źródłaJing Yang, Junwei Zhang, Jianpei Zhang, and Lejun Zhang. "Blocking Inference Channels of Sensitive Rules in Data Stream Mining." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 7 (2013): 196–203. http://dx.doi.org/10.4156/aiss.vol5.issue7.24.
Pełny tekst źródłaSirole, Tapan, and Jaytrilok Choudhary. "A Survey of Various Methodologies for Hiding Sensitive Association Rules." International Journal of Computer Applications 96, no. 18 (2014): 12–15. http://dx.doi.org/10.5120/16893-6942.
Pełny tekst źródłaPatel, Deepak, and Vineet Richhariya. "C Privacy Prevention of Discriminating Rules by Perturbing Sensitive Items." Communications on Applied Electronics 2, no. 8 (2015): 12–16. http://dx.doi.org/10.5120/cae2015651825.
Pełny tekst źródłaRajalakshmi, M., and T. Purusothaman. "Concealing party-centric sensitive rules in a centralized data source." International Journal of Machine Learning and Cybernetics 4, no. 5 (2012): 515–25. http://dx.doi.org/10.1007/s13042-012-0111-y.
Pełny tekst źródłaZhao, Mingjun. "Optimal simple rules in RE models with risk sensitive preferences." Economics Letters 97, no. 3 (2007): 260–66. http://dx.doi.org/10.1016/j.econlet.2007.03.004.
Pełny tekst źródła