{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:07:04Z","timestamp":1743052024048,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030687984"},{"type":"electronic","value":"9783030687991"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68799-1_32","type":"book-chapter","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T08:03:53Z","timestamp":1614845033000},"page":"439-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A PSO-Based Sanitization Process with Multi-thresholds Model"],"prefix":"10.1007","author":[{"given":"Jimmy Ming-Tai","family":"Wu","sequence":"first","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Shahab","family":"Tayeb","sequence":"additional","affiliation":[]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"key":"32_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: VLDB Conference, pp. 487\u2013499 (1994)"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACN SIGMOD International Conference on Management of Data, pp. 439\u2013450 (2000)","DOI":"10.1145\/335191.335438"},{"key":"32_CR3","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: Workshop on Knowledge and Data Engineering Exchange, pp. 45\u201352 (1999)"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: International Workshop on Information Hiding, pp. 369\u2013383 (2001)","DOI":"10.1007\/3-540-45496-9_27"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Fournier-Viger, P., et al.: The SPMF open-source data mining library version 2. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 36\u201340 (2016)","DOI":"10.1007\/978-3-319-46131-1_8"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Han, S., Ng, W.K.: Privacy-preserving genetic algorithms for rule discovery. In: International Conference on Data Warehousing and Knowledge Discovery, pp. 407\u2013417 (2007)","DOI":"10.1007\/978-3-540-74553-2_38"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Holland, J.H., et al.: Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. MIT Press (1992)","DOI":"10.7551\/mitpress\/1090.001.0001"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: International Conference on Neural Networks, vol. 4, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"issue":"4","key":"32_CR9","first-page":"201","volume":"4","author":"CW Lin","year":"2013","unstructured":"Lin, C.W., Hong, T.P., Chang, C.C., Wang, S.L.: A greedy-based approach for hiding sensitive itemsets by transaction insertion. J. Inf. Hiding Multimed. Signal Process. 4(4), 201\u2013227 (2013)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"32_CR10","first-page":"235837","volume":"2014","author":"CW Lin","year":"2014","unstructured":"Lin, C.W., Hong, T.P., Hsu, H.C.: Reducing side effects of hiding sensitive itemsets in privacy preserving data mining. Sci. World J. 2014, 235837 (2014)","journal-title":"Sci. World J."},{"issue":"2","key":"32_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/s10489-014-0590-5","volume":"42","author":"CW Lin","year":"2015","unstructured":"Lin, C.W., Hong, T.P., Yang, K.T., Wang, S.L.: The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2), 210\u2013230 (2015)","journal-title":"Appl. Intell."},{"key":"32_CR12","first-page":"398269","volume":"2014","author":"CW Lin","year":"2014","unstructured":"Lin, C.W., Zhang, B., Yang, K.T., Hong, T.P.: Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci. World J. 2014, 398269 (2014)","journal-title":"Sci. World J."},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Lin, J.C.W., Fournier-Viger, P., Wu, L., Gan, W., Djenouri, Y., Zhang, J.: PPSF: an open-source privacy-preserving and security mining framework. In: IEEE International Conference on Data Mining Workshops, pp. 1459\u20131463 (2018)","DOI":"10.1109\/ICDMW.2018.00208"},{"key":"32_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.engappai.2016.03.007","volume":"53","author":"JCW Lin","year":"2016","unstructured":"Lin, J.C.W., Liu, Q., Fournier-Viger, P., Hong, T.P., Voznak, M., Zhan, J.: A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 53, 1\u201318 (2016)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"11","key":"32_CR15","doi-asserted-by":"publisher","first-page":"3788","DOI":"10.1007\/s10489-020-01743-y","volume":"50","author":"JCW Lin","year":"2020","unstructured":"Lin, J.C.W., Pirouz, M., Djenouri, Y., Cheng, C.F., Ahmed, U.: Incrementally updating the high average-utility patterns with pre-large concept. Appl. Intell. 50(11), 3788\u20133807 (2020)","journal-title":"Appl. Intell."},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Lin, J.C.W., Srivastava, G., Zahng, Y., Djenouri, Y., Aloqaily, M.: Privacy preserving multi-objective sanitization model in 6g IoT environments. IEEE Internet Things J. (2020)","DOI":"10.1109\/JIOT.2020.3032896"},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"25359","DOI":"10.1109\/ACCESS.2019.2899831","volume":"7","author":"JCW Lin","year":"2019","unstructured":"Lin, J.C.W., Wu, J.M.T., Fournier-Viger, P., Djenouri, Y., Chen, C.H., Zhang, Y.: A sanitization approach to secure shared data in an IoT environment. IEEE Access 7, 25359\u201325368 (2019)","journal-title":"IEEE Access"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Lin, J.C.W., Yang, L., Fournier-Viger, P., Wu, M.T., Hong, T.P., Wang, L.S.L.: A swarm-based approach to mine high-utility itemsets. In: Multidisciplinary Social Networks Research, pp. 572\u2013581 (2015)","DOI":"10.1007\/978-3-662-48319-0_48"},{"issue":"23","key":"32_CR19","doi-asserted-by":"publisher","first-page":"12779","DOI":"10.1007\/s00500-019-03829-3","volume":"23","author":"JCW Lin","year":"2019","unstructured":"Lin, J.C.W., Zhang, Y., Zhang, B., Fournier-Viger, P., Djenouri, Y.: Hiding sensitive itemsets with multiple objective optimization. Soft. Comput. 23(23), 12779\u201312797 (2019)","journal-title":"Soft. Comput."},{"key":"32_CR20","unstructured":"Oliveira, S.R., Zaiane, O.R.: Privacy preserving frequent itemset mining. In: International Conference on Privacy, Security and Data Mining, vol. 14, pp. 43\u201354 (2002)"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Srivastava, G., Lin, J.C.W., Zhang, X., Li, Y.: Large-scale high-utility sequential pattern analytics in internet of things. IEEE Internet Things J. (2020)","DOI":"10.1109\/JIOT.2020.3026826"},{"issue":"1","key":"32_CR22","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"VS Verykios","year":"2004","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 33(1), 50\u201357 (2004)","journal-title":"ACM SIGMOD Record"},{"key":"32_CR23","first-page":"1","volume":"9","author":"TY Wu","year":"2019","unstructured":"Wu, T.Y., Lin, J.C.W., Zhang, Y., Chen, C.H.: A grid-based swarm intelligence algorithm for privacy-preserving data mining. Appl. Sci. 9, 1\u201320 (2019)","journal-title":"Appl. Sci."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition. ICPR International Workshops and Challenges"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68799-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T10:01:30Z","timestamp":1724580090000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68799-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030687984","9783030687991"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68799-1_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ICPR2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icpr2020.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}