AN EFFICIENT HIDING METHOD FOR PRIVACY PRESERVING UTILITY MINING
Last updated: 03 Jan 2025
10.21608/ijicis.2022.142694.1191
privacy preserving, Data Science, Utility Mining, Sensitive pattern, Sanitization process
Mohamed
Ali
Ashraf
Information Systems department, Computer Science, Ain Shams, Cairo, Egypt
mohamed.hassan.std2@cis.asu.edu.eg
Cairo
0000-0003-1342-9482
Sherine
Rady
Information Systems Dept, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt
srady@cis.asu.edu.eg
Cairo
0000-0003-4991-966X
Tamer
Abdelkader
Information Systems Dept, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt
tammabde@cis.asu.edu.eg
Cairo
0000-0003-4060-2535
Tarek
Gharib
F.
Information Systems Dept, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt
tfgharib@cis.asu.edu.eg
Cairo
0000-0003-0780-782X
23
1
40411
2023-03-01
2022-06-15
2023-03-01
69
83
1687-109X
2535-1710
https://ijicis.journals.ekb.eg/article_292030.html
https://ijicis.journals.ekb.eg/service?article_code=292030
292,030
Original Article
494
Journal
International Journal of Intelligent Computing and Information Sciences
https://ijicis.journals.ekb.eg/
AN EFFICIENT HIDING METHOD FOR PRIVACY PRESERVING UTILITY MINING
Details
Type
Article
Created At
23 Dec 2024