[1. Lin, C.-W., B. Zhang, K.-T. Yang, T.-P. Hong. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms. – Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, September 2014, Article ID 398269, pp. 1-13.]Search in Google Scholar
[2. Tassa, T. Secure Mining of Association Rules in Horizontally Distributed Databases. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, April 2014, Issue 4, pp. 970-983.10.1109/TKDE.2013.41]Search in Google Scholar
[3. Cheng, P., J.-S. Pan. Use EMO to Protect Sensitive Knowledge in Association Rule Mining by Adding Items. – ACM, July 2014, pp. 65-66.10.1145/2598394.2598465]Search in Google Scholar
[4. Cheng, P., J.-S. Pan. Completely Hide Sensitive Association Rules Using EMO by Deleting Transactions. – ACM, July 2014, pp. 167-168.10.1145/2598394.2598466]Search in Google Scholar
[5. Cheng, P., C.-W. Lin, J.-S. Pan. Use HypE to Hide Association Rules by Adding Items. – PLOS ONE | DOI:10.1371/journal.pone.0127834, Vol. 10, 12 June 2015, Issue 6, pp. 1-19.10.1371/journal.pone.0127834Vol.1012June2015Issue6pp.1-19]Open DOISearch in Google Scholar
[6. Lin, C.-W., T.-P. Hong, H.-C. H s u. Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining. – Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, 2014, Article ID 235837, pp. 1-12.]Search in Google Scholar
[7. Lin, C.-W., T.-P. Hong, J.-W. Wong, G.-C. Lan, W.-Y. Lin. A GA-Based Approach to Hide Sensitive High Utility Itemsets – Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, 2014, Article ID 804629, pp. 1-12.]Search in Google Scholar
[8. Sun, C., Y. Fu, J. Zhou, H. Gao. Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response. – Hindawi Publishing Corporation, The Scientific World Journal Vol. 2014, 2014, Article ID 686151, pp. 1-10.]Search in Google Scholar
[9. Sheykhinezhad, Z., M. Naderidehkordi, H. Rastegari. A Method for Hiding Association Rules with Minimum Changes in Database – ACSIJ Advances in Computer Science: An International Journal, Vol. 3, September 2014, Issue 5, pp. 83-90.]Search in Google Scholar
[10. Rao, K. S., N. M. Venkata, B. Debnath. An Association Rule Hiding Algorithm for Privacy Preserving Data Mining. – International Journal of Control and Automation, Vol. 7, 2014, Issue 10, pp. 393-404.10.14257/ijca.2014.7.10.36]Search in Google Scholar
[11. Shah1, R. A., S. Asghar. Privacy Preserving in Association Rules Using a Genetic Algorithm. – Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 22, February 2014, pp. 434-450.10.3906/elk-1206-66]Search in Google Scholar
[12. Janakiramaiah, B., A. R. M. Reddy. Privacy Preserving Association Rule Mining by Concept of Impact Factor Using Item Lattice. – Wseas Transactions on Computers, Vol. 13, June 2014, pp. 567-581.]Search in Google Scholar
[13. Li, Y., M. Chen, Q. Li, W. Zhang. Enabling Multilevel Trust in Privacy Preserving Data Mining. – IEEE Transactions on Knowledge and Data Engineering, Vol. 24, September 2012, Issue 9, pp. 1598-1612.10.1109/TKDE.2011.124]Search in Google Scholar
[14. Li, T., N. Li, J. Zhang, I. Molloy. Slicing: A New Approach to Privacy Preserving Data Publishing. – IEEE Transactions on Knowledge and Data Engineering, Vol. 24, March 2012, Issue 3, pp. 561-574.10.1109/TKDE.2010.236]Search in Google Scholar
[15. Paulet, R., M. G. Kaosar, X. Yi, E. Bertino. Privacy-Preserving and Content-Protecting Location Based Queries. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, May 2014, Issue 5, pp. 1200-1210.10.1109/TKDE.2013.87]Search in Google Scholar
[16. Pervaiz, Z., W. G. Aref, A. Ghafoor, N. Prabhu. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, April 2014, Issue 4, pp. 795-807.10.1109/TKDE.2013.71]Search in Google Scholar
[17. Goryczka, S., X. Li, B. C. M. Fung. m-Privacy for Collaborative Data Publishing. – IEEE Transactions of Knowledge and Data Engineering, Vol. 26, October 2014, Issue 10, pp. 2520-2533.10.1109/TKDE.2013.18]Search in Google Scholar
[18. Nabeel, M., E. Bertino. Privacy Preserving Delegated Access Control in Public Clouds. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, September 2014, Issue 9, pp. 2268-2280.10.1109/TKDE.2013.68]Search in Google Scholar
[19. Nabeel, M., E. Bertino. Privacy-Preserving Fine-Grained Access Control in Public Clouds. – IEEE Computer Society Technical Committee on Data Engineering, 2012, pp. 21-30.]Search in Google Scholar
[20. Bonchi, F., C. Castillo, D. Donato, A. Gionis. Taxonomy-Driven Lumping for Sequence Mining. – Data Mining and Knowledge Discovery, Vol. 19, October 2009, Issue 2, Springer, pp. 227-244.10.1007/s10618-009-0141-6]Open DOISearch in Google Scholar
[21. Amer-Yahia, S., F. Bonchi, C. Castillo, E. Feuerstein, I. Mendez-Diaz, P. Zabala. Composite Retrieval of Diverse and Complementary Bundles. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, November 2014, Issue 11, pp. 2662-2675.10.1109/TKDE.2014.2306678]Open DOISearch in Google Scholar
[22. Priyadarsini, R. P., M. L. Valarmathi, S. Sivakumari. Attribute Association Based Privacy Preservation for Multi Trust Level Environment. – Indian Academy of Science, Vol. 40, September 2015, Issue 6, Springer, pp. 1769-1792.10.1007/s12046-015-0412-4]Search in Google Scholar