{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:01:52Z","timestamp":1746331312986,"version":"3.40.4"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077758"},{"type":"electronic","value":"9783319077765"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07776-5_10","type":"book-chapter","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T14:36:47Z","timestamp":1401115007000},"page":"87-95","source":"Crossref","is-referenced-by-count":0,"title":["Hiding Sensitive Itemsets with Minimal Side Effects in Privacy Preserving Data Mining"],"prefix":"10.1007","author":[{"given":"Chun-Wei","family":"Lin","sequence":"first","affiliation":[]},{"given":"Tzung-Pei","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Hung-Chuan","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1109\/69.250074","volume":"5","author":"R. Agrawal","year":"1993","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Database mining: A performance perspective. IEEE Transactions on Knowledge and Data Engineering\u00a05, 914\u2013925 (1993)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10_CR2","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: The International Conference on Very Large Data Bases, pp. 487\u2013499 (1994)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: The Workshop on Knowledge and Data Engineering Exchange, pp. 45\u201352 (1999)","DOI":"10.1109\/KDEX.1999.836532"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: ACM SIGMOD International Conference on Management of Data, pp. 439\u2013450 (2000)","DOI":"10.1145\/335191.335438"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.dss.2006.08.007","volume":"43","author":"A. Amiri","year":"2007","unstructured":"Amiri, A.: Dare to share: Protecting sensitive knowledge with data sanitization. Decision Support Systems\u00a043, 181\u2013191 (2007)","journal-title":"Decision Support Systems"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Berkhin, P.: A survey of clustering data mining techniques. Grouping Multidimensional Data, 25\u201371 (2006)","DOI":"10.1007\/3-540-28349-8_2"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45496-9_27","volume-title":"Information Hiding","author":"E. Dasseni","year":"2001","unstructured":"Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, p. 369. Springer, Heidelberg (2001)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Gkoulalas-Divanis, A., Verykios, V.S.: An integer programming approach for frequent itemset hiding. In: ACM International Conference on Information and Knowledge Management, pp. 748\u2013757 (2006)","DOI":"10.1145\/1183614.1183721"},{"key":"10_CR9","first-page":"98","volume":"3","author":"K. Duraiswamy","year":"2009","unstructured":"Duraiswamy, K., Manjula, D., Maheswari, N.: Advanced approach in sensitive rule hiding. CCSE Modern Applied Science\u00a03, 98\u2013107 (2009)","journal-title":"CCSE Modern Applied Science"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TKDE.2008.199","volume":"21","author":"A. Gkoulalas-Divanis","year":"2009","unstructured":"Gkoulalas-Divanis, A., Verykios, V.S.: Exact knowledge hiding through database extension. IEEE Transactions on Knowledge and Data Engineering\u00a021, 699\u2013713 (2009)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1109\/69.806937","volume":"11","author":"J. Han","year":"1999","unstructured":"Han, J., Fu, Y.: Mining multiple-level association rules in large databases. IEEE Transactions on Knowledge and Data Engineering\u00a011, 798\u2013805 (1999)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1023\/B:DAMI.0000005258.31418.83","volume":"8","author":"J. Han","year":"2004","unstructured":"Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Mining and Knowledge Discovery\u00a08, 53\u201387 (2004)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"2424","DOI":"10.1016\/j.eswa.2007.04.009","volume":"34","author":"T.P. Hong","year":"2008","unstructured":"Hong, T.P., Lin, C.W., Wu, Y.L.: Incrementally fast updated frequent pattern trees. Expert Systems with Applications\u00a034, 2424\u20132435 (2008)","journal-title":"Expert Systems with Applications"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Hong, T.P., Lin, C.W., Yang, K.T., Wang, S.L.: A lattice-based data sanitization approach. IEEE International Conference on Systems, Man, and Cybernetics, 2325\u20132329 (2011)","DOI":"10.1109\/ICSMC.2011.6084025"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/s10489-012-0377-5","volume":"38","author":"T.P. Hong","year":"2013","unstructured":"Hong, T.P., Lin, C.W., Yang, K.T., Wang, S.L.: Using TF-IDF to hide sensitive itemsets. Applied Intelligence\u00a038, 502\u2013510 (2013)","journal-title":"Applied Intelligence"},{"key":"10_CR16","unstructured":"Kotsiantis, S.B.: Supervised machine learning: A review of classification techniques. In: The Conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, pp. 3\u201324 (2007)"},{"key":"10_CR17","unstructured":"Leary, D.E.O.: Knowledge discovery as a threat to database security. Knowledge Discovery in Databases, pp. 507\u2013516 (1991)"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"7419","DOI":"10.1016\/j.eswa.2010.12.082","volume":"38","author":"C.W. Lin","year":"2011","unstructured":"Lin, C.W., Hong, T.P., Lu, W.H.: An effective tree structure for mining high utility itemsets. Expert Systems with Applications\u00a038, 7419\u20137424 (2011)","journal-title":"Expert Systems with Applications"},{"key":"10_CR19","first-page":"201","volume":"4","author":"C.W. Lin","year":"2013","unstructured":"Lin, C.W., Hong, T.P., Chang, C.C., Wang, S.L.: A greedy-based approach for hiding sensitive itemsets by transaction insertion. Journal of Information Hiding and Multimedia Signal Processing\u00a04, 201\u2013227 (2013)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"10_CR20","first-page":"190","volume":"3","author":"C.W. Lin","year":"2013","unstructured":"Lin, C.W., Hong, T.P.: A survey of fuzzy web mining. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery\u00a03, 190\u2013199 (2013)","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Modi, C.N., Rao, U.P., Patel, D.R.: Maintaining privacy and data quality in privacy preserving association rule mining. In: International Conference on Computing Communication and Networking Technologies, pp. 1\u20136 (2010)","DOI":"10.1109\/ICCCNT.2010.5592589"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/TKDE.2007.250583","volume":"19","author":"Y.H. Wu","year":"2007","unstructured":"Wu, Y.H., Chiang, C.M., Chen, A.L.P.: Hiding sensitive association rules with limited side effects. IEEE Transactions on Knowledge and Data Engineering\u00a019, 29\u201342 (2007)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Kohavi, R., Mason, L.: Real world performance of association rule algorithms. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 401\u2013406 (2001)","DOI":"10.1145\/502512.502572"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data analysis and its Applications, Volume I"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07776-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T03:22:12Z","timestamp":1746242532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07776-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077758","9783319077765"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07776-5_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}