Sequence data increasingly shared by organizations to enable mining applications market-basket analysis web and process modeling preference-based services Mining may expose sensitive sequential patterns, which allow intrusive inferences to individuals provide competitive advance to organizations This threat causes unsolicited advertisement, customer profiling, financial and reputational loss, etc. It has transpired in several cases (e.g., Walmart- P&G). Permutation-based Sequential Pattern Hiding 4Motivation (2/3) Insurance company shares sequence data with marketing partners. Data can be mined to find the number of customers who bought sports car, travel, and home insurance in this order ([f, g, b]), or travel, home, and trailer insura...
Abstract—A large amount of transaction data containing associations between individuals and sensitiv...
Security risk assessment and prevention in ICT systems rely on the analysis of data on the joint beh...
Web queries, credit card transactions, and medical records are examples of transaction data flowing ...
Sequence data are increasingly shared to enable mining applications, in various domains such as mark...
Sequence datasets are encountered in a plethora of applications spanning from web usage analysis to ...
Sequence data are encountered in a plethora of applications, spanning from telecommunications to web...
Currently, individuals leave a digital trace of their activities when they use their smartphones, so...
University of Technology, Sydney. Faculty of Engineering and Information Technology.NO FULL TEXT AVA...
Abstract — Enormous amount of detailed private data is recurrently collected and analysed by applica...
[[abstract]]Data mining mechanisms have widely been applied in various businesses and manufacturing ...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enha...
ICT risk assessment and management relies on the analysis of data on the joint behavior of a target ...
International audienceResearch in the areas of privacy-preserving techniques in databases and subseq...
44 pagesInternational audienceDuring the past decade, sequential pattern mining has been the core of...
Abstract—A large amount of transaction data containing associations between individuals and sensitiv...
Security risk assessment and prevention in ICT systems rely on the analysis of data on the joint beh...
Web queries, credit card transactions, and medical records are examples of transaction data flowing ...
Sequence data are increasingly shared to enable mining applications, in various domains such as mark...
Sequence datasets are encountered in a plethora of applications spanning from web usage analysis to ...
Sequence data are encountered in a plethora of applications, spanning from telecommunications to web...
Currently, individuals leave a digital trace of their activities when they use their smartphones, so...
University of Technology, Sydney. Faculty of Engineering and Information Technology.NO FULL TEXT AVA...
Abstract — Enormous amount of detailed private data is recurrently collected and analysed by applica...
[[abstract]]Data mining mechanisms have widely been applied in various businesses and manufacturing ...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enha...
ICT risk assessment and management relies on the analysis of data on the joint behavior of a target ...
International audienceResearch in the areas of privacy-preserving techniques in databases and subseq...
44 pagesInternational audienceDuring the past decade, sequential pattern mining has been the core of...
Abstract—A large amount of transaction data containing associations between individuals and sensitiv...
Security risk assessment and prevention in ICT systems rely on the analysis of data on the joint beh...
Web queries, credit card transactions, and medical records are examples of transaction data flowing ...