• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于遗传算法通过事务删除有效隐藏敏感项集

Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms.

作者信息

Lin Chun-Wei, Zhang Binbin, Yang Kuo-Tung, Hong Tzung-Pei

机构信息

Innovative Information Industry Research Center (IIIRC), School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen 518055, China ; Shenzhen Key Laboratory of Internet Information Collaboration, School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen 518055, China.

Medical School, Shenzhen University, Shenzhen 518060, China.

出版信息

ScientificWorldJournal. 2014;2014:398269. doi: 10.1155/2014/398269. Epub 2014 Sep 1.

DOI:10.1155/2014/398269
PMID:25254239
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC4165802/
Abstract

Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM) has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT) algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA) mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT) algorithm and the greedy approach in terms of execution time and three side effects.

摘要

数据挖掘用于从非常大的数据库中挖掘有意义且有用的信息或知识。通过数据挖掘技术可能会发现一些安全或私密信息,从而带来隐私受到威胁的内在风险。因此,近年来出现了隐私保护数据挖掘(PPDM),对原始数据库进行清理以隐藏敏感信息,这在清理过程中可被视为一个NP难问题。本文因此提出了一种基于紧凑预大遗传算法的(cpGA2DT)算法,用于删除事务以隐藏敏感项集。它通过采用基于紧凑遗传算法(cGA)的机制和预大概念来解决进化过程的局限性。因此设计了一个具有三个可调权重的灵活适应度函数,以找到要删除的合适事务,从而以最小的隐藏失败、缺失成本和人工成本等副作用来隐藏敏感项集。进行实验以展示所提出的cpGA2DT算法与基于简单遗传算法的(sGA2DT)算法和贪婪方法相比在执行时间和三种副作用方面的性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/89789270125e/TSWJ2014-398269.alg.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/4a6818bfa329/TSWJ2014-398269.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/13ab20ece0ce/TSWJ2014-398269.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/b6631ea0219d/TSWJ2014-398269.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/7fc248c00525/TSWJ2014-398269.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/1f091326f9c2/TSWJ2014-398269.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/f0825e49999d/TSWJ2014-398269.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/c337caed3bfa/TSWJ2014-398269.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/552d092b915b/TSWJ2014-398269.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/90278927e2e0/TSWJ2014-398269.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/69ba6181dfd6/TSWJ2014-398269.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/cb70835b3a7d/TSWJ2014-398269.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/ac2077f30a28/TSWJ2014-398269.012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/c0f5ccf54277/TSWJ2014-398269.013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/b23e400a071b/TSWJ2014-398269.014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/bf2b9832b8ff/TSWJ2014-398269.015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/53e1a3550a2f/TSWJ2014-398269.016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/da5873091fa7/TSWJ2014-398269.017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/834896d7617c/TSWJ2014-398269.018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/7c14be66203d/TSWJ2014-398269.019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/1bc7305172da/TSWJ2014-398269.020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/87a7d5392e22/TSWJ2014-398269.021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/13b3ebb7df61/TSWJ2014-398269.022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/89789270125e/TSWJ2014-398269.alg.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/4a6818bfa329/TSWJ2014-398269.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/13ab20ece0ce/TSWJ2014-398269.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/b6631ea0219d/TSWJ2014-398269.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/7fc248c00525/TSWJ2014-398269.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/1f091326f9c2/TSWJ2014-398269.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/f0825e49999d/TSWJ2014-398269.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/c337caed3bfa/TSWJ2014-398269.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/552d092b915b/TSWJ2014-398269.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/90278927e2e0/TSWJ2014-398269.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/69ba6181dfd6/TSWJ2014-398269.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/cb70835b3a7d/TSWJ2014-398269.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/ac2077f30a28/TSWJ2014-398269.012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/c0f5ccf54277/TSWJ2014-398269.013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/b23e400a071b/TSWJ2014-398269.014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/bf2b9832b8ff/TSWJ2014-398269.015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/53e1a3550a2f/TSWJ2014-398269.016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/da5873091fa7/TSWJ2014-398269.017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/834896d7617c/TSWJ2014-398269.018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/7c14be66203d/TSWJ2014-398269.019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/1bc7305172da/TSWJ2014-398269.020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/87a7d5392e22/TSWJ2014-398269.021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/13b3ebb7df61/TSWJ2014-398269.022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4547/4165802/89789270125e/TSWJ2014-398269.alg.001.jpg

相似文献

1
Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms.基于遗传算法通过事务删除有效隐藏敏感项集
ScientificWorldJournal. 2014;2014:398269. doi: 10.1155/2014/398269. Epub 2014 Sep 1.
2
Reducing side effects of hiding sensitive itemsets in privacy preserving data mining.减少隐私保护数据挖掘中隐藏敏感项集的副作用。
ScientificWorldJournal. 2014;2014:235837. doi: 10.1155/2014/235837. Epub 2014 Apr 10.
3
The density-based clustering method for privacy-preserving data mining.用于隐私保护数据挖掘的基于密度的聚类方法。
Math Biosci Eng. 2019 Feb 27;16(3):1718-1728. doi: 10.3934/mbe.2019082.
4
A GA-based approach to hide sensitive high utility itemsets.一种基于遗传算法的隐藏敏感高实用项集的方法。
ScientificWorldJournal. 2014 Mar 3;2014:804629. doi: 10.1155/2014/804629. eCollection 2014.
5
Protecting the Privacy of Cancer Patients Using Fuzzy Association Rule Hiding.使用模糊关联规则隐藏技术保护癌症患者的隐私
Asian Pac J Cancer Prev. 2019 May 25;20(5):1437-1443. doi: 10.31557/APJCP.2019.20.5.1437.
6
The Mining Algorithm of Maximum Frequent Itemsets Based on Frequent Pattern Tree.基于频繁模式树的最大频繁项集挖掘算法。
Comput Intell Neurosci. 2022 May 18;2022:7022168. doi: 10.1155/2022/7022168. eCollection 2022.
7
Privacy-preserving heterogeneous health data sharing.隐私保护的异构健康数据共享。
J Am Med Inform Assoc. 2013 May 1;20(3):462-9. doi: 10.1136/amiajnl-2012-001027. Epub 2012 Dec 13.
8
An efficient algorithm for mining closed itemsets.一种挖掘封闭项集的高效算法。
J Zhejiang Univ Sci. 2004 Jan;5(1):8-15. doi: 10.1007/BF02839306.
9
An incremental high-utility mining algorithm with transaction insertion.一种带有事务插入的增量式高实用性挖掘算法。
ScientificWorldJournal. 2015;2015:161564. doi: 10.1155/2015/161564. Epub 2015 Feb 25.
10
Negative and positive association rules mining from text using frequent and infrequent itemsets.基于频繁和非频繁项集从文本中挖掘正负关联规则。
ScientificWorldJournal. 2014;2014:973750. doi: 10.1155/2014/973750. Epub 2014 May 18.