{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T13:55:02Z","timestamp":1758981302140,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030590505"},{"type":"electronic","value":"9783030590512"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59051-2_28","type":"book-chapter","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T19:02:51Z","timestamp":1599937371000},"page":"407-416","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Privacy-Preserving Spatio-Temporal Patient Data Publishing"],"prefix":"10.1007","author":[{"given":"Anifat M.","family":"Olawoyin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7541-9127","authenticated-orcid":false,"given":"Carson K.","family":"Leung","sequence":"additional","affiliation":[]},{"given":"Ratna","family":"Choudhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,8]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: IEEE ICDE 2008, pp. 376\u2013385 (2018)","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Acs, G., Castelluccia, C.: A case study: privacy preserving release of spatio-temporal density in Paris. In: ACM KDD 2014, pp. 1679\u20131688 (2014)","DOI":"10.1145\/2623330.2623361"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: ACM CCS 2013, pp. 901\u2013914 (2013)","DOI":"10.1145\/2508859.2516735"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/978-3-642-32600-4_38","volume-title":"Database and Expert Systems Applications","author":"NR Arora","year":"2012","unstructured":"Arora, N.R., Lee, W., Leung, C.K.-S., Kim, J., Kumar, H.: Efficient fuzzy ranking for keyword search on graphs. In: Liddle, S.W., Schewe, K.-D., Tjoa, A.M., Zhou, X. (eds.) DEXA 2012, Part I. LNCS, vol. 7446, pp. 502\u2013510. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32600-4_38"},{"issue":"1","key":"28_CR5","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.ejor.2017.02.046","volume":"262","author":"G Athanasopoulos","year":"2017","unstructured":"Athanasopoulos, G., Hyndman, R.J., Kourentzes, N., Petropoulos, F.: Forecasting with temporal hierarchies. EJOR 262(1), 60\u201374 (2017)","journal-title":"EJOR"},{"key":"28_CR6","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-030-22354-0_21","volume-title":"Complex, Intelligent, and Software Intensive Systems","author":"A-RA Audu","year":"2020","unstructured":"Audu, A.-R.A., Cuzzocrea, A., Leung, C.K., MacLeod, K.A., Ohin, N.I., Pulgar-Vidal, N.C.: An intelligent predictive analytics system for transportation analytics on open data towards the development of a smart city. In: Barolli, L., Hussain, F.K., Ikeda, M. (eds.) CISIS 2019. AISC, vol. 993, pp. 224\u2013236. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22354-0_21"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Cao, Y., Yoshikawa, M., Xiao, Y., Xiong, L.: Quantifying differential privacy under temporal correlations. In: IEEE ICDE 2017, pp. 821\u2013832 (2017)","DOI":"10.1109\/ICDE.2017.132"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Cho, E., Myers, S.A., Leskovec, J.: Friendship and mobility: user movement in location-based social networks. In: ACM KDD 2011, pp. 1082\u20131090 (2011)","DOI":"10.1145\/2020408.2020579"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-319-98812-2_44","volume-title":"Database and Expert Systems Applications","author":"A Dandekar","year":"2018","unstructured":"Dandekar, A., Basu, D., Bressan, S.: Differential privacy for regularised linear regression. In: Hartmann, S., Ma, H., Hameurlain, A., Pernul, G., Wagner, R.R. (eds.) DEXA 2018, Part II. LNCS, vol. 11030, pp. 483\u2013491. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98812-2_44"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.ins.2019.09.035","volume":"527","author":"CS Eom","year":"2020","unstructured":"Eom, C.S., Lee, C.C., Lee, W., Leung, C.K.: Effective privacy preserving data publishing by vectorization. Inf. Sci. 527, 311\u2013328 (2020)","journal-title":"Inf. Sci."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Eom, C.S., Lee, W., Leung, C.K.: STDP: secure privacy-preserving trajectory data publishing. In: IEEE Cybermatics 2018, pp. 892\u2013899 (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00170"},{"issue":"4","key":"28_CR13","first-page":"14:1","volume":"42","author":"BC Fung","year":"2010","unstructured":"Fung, B.C., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM CSur 42(4), 14:1\u201314:53 (2010)","journal-title":"ACM CSur"},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-030-27615-7_27","volume-title":"Database and Expert Systems Applications","author":"S Khouri","year":"2019","unstructured":"Khouri, S., Lanasri, D., Saidoune, R., Boudoukha, K., Bellatreche, L.: LogLInc: LoG queries of linked open data investigator for cube design. In: Hartmann, S., K\u00fcng, J., Chakravarthy, S., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) DEXA 2019, Part II. LNCS, vol. 11706, pp. 352\u2013367. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-27615-7_27"},{"issue":"2","key":"28_CR15","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/380995.381005","volume":"2","author":"LVS Lakshmanan","year":"2000","unstructured":"Lakshmanan, L.V.S., Leung, C.K., Ng, R.T.: The segment support map: scalable mining of frequent itemsets. ACM SIGKDD Explor. 2(2), 21\u201327 (2000)","journal-title":"ACM SIGKDD Explor."},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain $$k$$-anonymity. In: ACM SIGMOD 2005, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Leung, C.K.: Frequent itemset mining with constraints. In: Encyclopedia of Database Systems, 2nd edn., pp. 1531\u20131536 (2018)","DOI":"10.1007\/978-1-4614-8265-9_170"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Leung, C.K., Hoi, C.S.H., Pazdor, A.G.M., Wodi, B.H., Cuzzocrea, A.: Privacy-preserving frequent pattern mining from big uncertain data. In: IEEE BigData 2018, pp. 5101\u20135110 (2018)","DOI":"10.1109\/BigData.2018.8622260"},{"issue":"1","key":"28_CR19","doi-asserted-by":"publisher","first-page":"154:1","DOI":"10.1007\/s13278-014-0154-z","volume":"4","author":"CK-S Leung","year":"2014","unstructured":"Leung, C.K.-S., Tanbeer, S.K., Cameron, J.J.: Interactive discovery of influential friends from social networks. Soc. Netw. Anal. Min. 4(1), 154:1\u2013154:13 (2014). https:\/\/doi.org\/10.1007\/s13278-014-0154-z","journal-title":"Soc. Netw. Anal. Min."},{"key":"28_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-98809-2_1","volume-title":"Database and Expert Systems Applications","author":"CK Leung","year":"2018","unstructured":"Leung, C.K., Zhang, H., Souza, J., Lee, W.: Scalable vertical mining for big data analytics of frequent itemsets. In: Hartmann, S., Ma, H., Hameurlain, A., Pernul, G., Wagner, R.R. (eds.) DEXA 2018, Part I. LNCS, vol. 11029, pp. 3\u201317. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98809-2_1"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: $$t$$-closeness: privacy beyond $$k$$-anonymity and $$l$$-diversity. In: IEEE ICDE 2007, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"28_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1007\/978-3-319-98812-2_45","volume-title":"Database and Expert Systems Applications","author":"JC-W Lin","year":"2018","unstructured":"Lin, J.C.-W., Zhang, Y., Fournier-Viger, P., Djenouri, Y., Zhang, J.: A metaheuristic algorithm for hiding sensitive itemsets. In: Hartmann, S., Ma, H., Hameurlain, A., Pernul, G., Wagner, R.R. (eds.) DEXA 2018, Part II. LNCS, vol. 11030, pp. 492\u2013498. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98812-2_45"},{"issue":"1","key":"28_CR23","first-page":"3:1","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: $$l$$-diversity: privacy beyond $$k$$-anonymity. ACM TKDD 1(1), 3:1\u20133:52 (2007)","journal-title":"ACM TKDD"},{"key":"28_CR24","doi-asserted-by":"publisher","first-page":"10562","DOI":"10.1109\/ACCESS.2017.2706947","volume":"5","author":"R Mendes","year":"2017","unstructured":"Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5, 10562\u201310582 (2017)","journal-title":"IEEE Access"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Mohammed, N., Fung, B.C.M., Debbabi, M.: Walking in the crowd: anonymizing trajectory data for pattern analysis. In: ACM CIKM 2009, pp. 1441\u20131444 (2009)","DOI":"10.1145\/1645953.1646140"},{"key":"28_CR26","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.procs.2018.10.300","volume":"140","author":"AM Olawoyin","year":"2018","unstructured":"Olawoyin, A.M., Chen, Y.: Predicting the future with artificial neural network. Procedia Comput. Sci. 140, 383\u2013392 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"28_CR27","unstructured":"Statistics Canada: Representative point. Illustrated Glossary, Census Year 2011 (2011). https:\/\/www150.statcan.gc.ca\/n1\/pub\/92-195-x\/2011001\/other-autre\/point\/point-eng.htm"},{"issue":"2\u20133","key":"28_CR28","first-page":"157","volume":"24","author":"SK Tanbeer","year":"2014","unstructured":"Tanbeer, S.K., Leung, C.K., Cameron, J.J.: Interactive mining of strong friends from social networks and its applications in e-commerce. JOCEC 24(2\u20133), 157\u2013173 (2014)","journal-title":"JOCEC"},{"key":"28_CR29","doi-asserted-by":"publisher","unstructured":"Wodi, B.H., Leung, C.K., Cuzzocrea, A., Sourav, S.: Fast privacy-preserving keyword search on encrypted outsourced data. In: IEEE BigData 2019, pp. 6266\u20136275 (2019). https:\/\/doi.org\/10.1109\/BigData47090.2019.9046058","DOI":"10.1109\/BigData47090.2019.9046058"},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Xiong, L.: Protecting locations with differential privacy under temporal correlations. In: ACM CCS 2015, pp. 1298\u20131309 (2015)","DOI":"10.1145\/2810103.2813640"},{"key":"28_CR31","doi-asserted-by":"publisher","unstructured":"Yin, Y., Kaku, I., Tang, J., Zhu, J.: Privacy-preserving data mining. In: Data Mining. Decision Engineering, pp. 101\u2013119. Springer, London (2011). https:\/\/doi.org\/10.1007\/978-1-84996-338-1_6","DOI":"10.1007\/978-1-84996-338-1_6"},{"issue":"2","key":"28_CR32","first-page":"32","volume":"33","author":"Y Zheng","year":"2010","unstructured":"Zheng, Y., Xie, X., Ma, W.: GeoLife: a collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull. 33(2), 32\u201339 (2010)","journal-title":"IEEE Data Eng. Bull."}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59051-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:40:24Z","timestamp":1709811624000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59051-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590505","9783030590512"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59051-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bratislava","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/dexa2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"190","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online. DEXA Workshops volume: submissions sent - 15, full papers accepted - 6, short papers accepted - 4, reviewers per paper 3, papers per reviewer 1-2","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}