Author of the publication

Efficient privacy preserving algorithms for hiding sensitive high utility itemsets.

, , , and . Comput. Secur., (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incomplete high dimensional data streams clustering., , , and . J. Intell. Fuzzy Syst., 39 (3): 4227-4243 (2020)A user-concept matrix clustering algorithm for efficient next page prediction., , , and . Int. J. Knowl. Web Intell., 5 (3): 208-229 (2016)A Hybrid Feature Selection Approach for Arabic Documents Classification., , and . Egypt. Comput. Sci. J., 28 (3): 1-7 (2006)Influence propagation in social networks: Interest-based community ranking model., , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (5): 2231-2243 (2022)An efficient technique for incremental updating of association rules., , and . Int. J. Hybrid Intell. Syst., 5 (1): 45-53 (2008)Data Clustering Using a two-Stage Fuzzy and Sequential K-means Algorithms., and . IC-AI, page 529-534. CSREA Press, (2002)Fuzzy Document Clustering Approach using WordNet Lexical Categories., , and . SCSS (2), page 181-186. Springer, (2008)A Robust Privacy Preserving Approach for Sanitizing Transaction Databases from Sensitive High Utility Patterns., , , and . AISI, volume 152 of Lecture Notes on Data Engineering and Communications Technologies, page 381-394. Springer, (2022)An efficient filtering technique for super-graph query processing., , and . ICDIM, page 174-181. IEEE, (2010)Enriching Ontologies using Coarse-Grained Word Senses In The Case Of: WordNet., , , and . Egypt. Comput. Sci. J., (2010)