[1] Lee, G., Chang, C.-Y., & Chen, A. L. "Hiding sensitive patterns in association rules mining". Computer Software and Applications Conference. COMPSAC, 2004. Proceedings of the 28th Annual International.
[2] Li, X., Liu, Z. and Zuo, C., 2009, June. "Hiding association rules based on relative-non-sensitive frequent itemsets". In Cognitive Informatics. ICCI'09. 8th IEEE International Conference, 2009, pp. 384-389.
[3] Natarajan, R., Sugumar, R., Mahendran, M., & Anbazhagan, K. "Design and Implement an Association Rule hiding Algorithm for Privacy Preserving Data Mining". International Journal of Advanced Research in Computer and Communication Engineering, 2012, 1(7).
[4] Oliveira, S. R., & Zaiane, O. R. "Privacy preserving frequent itemset mining". Paper presented at the Proceedings of the IEEE international conference on Privacy, security and data mining, 2002, Vol 14.
[5] Oliveira, S. R., & Zaiane, O. R. Algorithms for balancing privacy and knowledge discovery in association rule mining. Paper presented at the Database Engineering and Applications Symposium, 2003. Proceedings. Seventh International.
[6] Saygin, Y., Verykios, V. S., & Clifton, C. "Using unknowns to prevent discovery of association rules". ACM Sigmod Record, 30(4), 2001, pp. 45-54.
[7] Shah, K., Thakkar, A., & Ganatra, A. "Association Rule Hiding by Heuristic Approach to Reduce Side Effects & Hide Multiple RHS Items". International Journal of Computer Applications,2012, 45(1).
[8] Verykios, V. S., Elmagarmid, A. K., Bertino, E., Saygin, Y., & Dasseni, E. "Association rule hiding. Knowledge and Data Engineering", IEEE Transactions on, 16(4), 2004, pp. 434-447.
[9] Wang, E. T., & Lee, G. "An efficient sanitization algorithm for balancing information privacy and knowledge discovery in association patterns mining". Data & Knowledge Engineering, 65(3), 2008, pp. 463-484.
[10] Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., & Verykios, V. "Disclosure limitation of sensitive rules". In Knowledge and Data Engineering Exchange, (KDEX'99) Proceedings. Workshop, 1999, pp. 45-52. IEEE.
[11] Dasseni, Elena, Vassilios S. Verykios, Ahmed K. Elmagarmid, and Elisa Bertino. "Hiding association rules by using confidence and support." In Information Hiding. Springer Berlin Heidelberg, 2001, pp. 369-383.
[12] Ganatra, K. S. a. A. T. a. "Association Rule Hiding by Heuristic Approach to Reduce Side Effects and Hide Multiple R.H.S. Items". International Journal of Computer Applications, 2012, 45, pp. 1-7.
[13] Oliveira, S. R. "Protecting sensitive knowledge by data sanitization". 13th IEEE International Conference on Data Mining, 2003.
[14] Wang, S.-L., Parikh, B., & Jafari, A. "Hiding informative association rule sets. Expert Systems with Applications", 33(2), 2007, pp. 316-323.
[15] Wang, S.-L., Patel, D., Jafari, A., & Hong, T.-P. "Hiding collaborative recommendation association rules. Applied Intelligence", 27(1), 2007, pp. 67-77.
[16] Yeh, J.-S., Hsu, P.-C., & Wen, M.-H. (2008). "Novel Algorithms for Privacy Preserving Utility Mining. Paper presented at the Intelligent Systems Design and Applications", 2008. ISDA'08. Eighth International Conference on Intelligent Systems Design and Applications Vol. 1 pp. 291-296.
[17] C-W. Lin, T-P. Hong, H-C. Hsu, "Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining", The Scientific World Journal, Vol. 2, 2014.
[18] Cheng, P., Roddick, J. F., Chu, S. C., & Lin, C. W. "Privacy preservation through a greedy, distortion-based rule-hiding method". Applied Intelligence, pp. 1-12, 2015.