{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:40:05Z","timestamp":1747176005887,"version":"3.40.5"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319131856"},{"type":"electronic","value":"9783319131863"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13186-3_9","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T20:09:58Z","timestamp":1417464598000},"page":"87-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy Preserving Association Rule Mining Using Binary Encoded NSGA-II"],"prefix":"10.1007","author":[{"given":"Peng","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,26]]},"reference":[{"issue":"4","key":"9_CR1","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"VS Verykios","year":"2004","unstructured":"Verykios, V.S., Elmagarmid, A.K., et al.: Association rule hiding. IEEE Trans. Knowl. Data Eng. 16(4), 434\u2013447 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Atallah, M.B.E., Elmagarmid, A., Ibrahim, M., Verykios, V.S.: Disclosure limitation of sensitive rules. In: Proceedings of IEEE Workshop on Knowledge and Data Engineering Exchange, Chicago, IL, pp. 45\u201352 (1999)","DOI":"10.1109\/KDEX.1999.836532"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: Proceedings of the 4th International Workshop on Information Hiding, pp. 369\u2013383 (2001)","DOI":"10.1007\/3-540-45496-9_27"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/TKDE.2007.250583","volume":"19","author":"YH Wu","year":"2007","unstructured":"Wu, Y.H., Chiang, C.C., Chen, A.L.P.: Hiding sensitive association rules with limited side effects. IEEE Trans. Knowl. Data Eng. 19(1), 29\u201342 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.dss.2006.08.007","volume":"43","author":"A Amiri","year":"2007","unstructured":"Amiri, A.: Dare to share: Protecting sensitive knowledge with data sanitization. Decis. Support Syst. 43(1), 181\u2013191 (2007)","journal-title":"Decis. Support Syst."},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1002\/widm.1082","volume":"3","author":"VS Verykios","year":"2013","unstructured":"Verykios, V.S.: Association rule hiding methods. Wiley Interdisc. Rev. Data Min. Knowl. Disc. 3(1), 28\u201336 (2013)","journal-title":"Wiley Interdisc. Rev. Data Min. Knowl. Disc."},{"key":"9_CR8","unstructured":"Sun, X., Yu, P.S.: A border-based approach for hiding sensitive frequent itemsets. In: Proceedings of Fifth IEEE International Conference on Data Mining (ICDM \u201905), pp. 426\u2013433, (2005)"},{"issue":"5","key":"9_CR9","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TKDE.2008.199","volume":"21","author":"AG Divanis","year":"2009","unstructured":"Divanis, A.G., Verykios, V.S.: Exact knowledge hiding through database extension. IEEE Trans. Knowl. Data Eng. 21(5), 699\u2013713 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"9_CR10","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/s10489-012-0377-5","volume":"38","author":"TP Hong","year":"2013","unstructured":"Hong, T.P., Lin, C.W., Yang, K.T., Wang, S.L.: Using TF-IDF to hide sensitive itemsets. Appl. Intell. 38(4), 502\u2013510 (2013)","journal-title":"Appl. Intell."},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/3-540-36970-8_35","volume-title":"Evolutionary Multi-Criterion Optimization","author":"S Bleuler","year":"2003","unstructured":"Bleuler, S., Laumanns, M., Thiele, L., Zitzler, E.: PISA \u2013 a platform and programming language independent interface for search algorithms. In: Fonseca, C.M., Fleming, P.J., Zitzler, E., Deb, K., Thiele, L. (eds.) EMO 2003. LNCS, vol. 2632, pp. 494\u2013508. Springer, Heidelberg (2003)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Sawmi, A.: Mining association rules between sets of items in large databases. In: Proceedings of the ACM SIGMOD Conference on Management of Data (SIGMOD), pp. 207\u2013216 (1993)","DOI":"10.1145\/170036.170072"},{"key":"9_CR13","unstructured":"Agrawal, R., Srikant, R.: Fast algorithm for mining association rules. In: Proceedings of the International Conference on Very Large Data Bases (VLDB), pp. 487\u2013499 (1994)"},{"key":"9_CR14","unstructured":"Bodon, F.: Surprising results of trie-based FIM algorithms. In: Proceedings of IEEE ICDM Workshop on Frequent Itemset Mining Implementations (FIMI \u201904), Brighton, UK (2004)"},{"key":"9_CR15","unstructured":"Bodon, F.: A fast APRIORI implementation. In: IEEE ICDM Workshop on Frequent Itemset Mining Implementations (FIMI \u201903), Melbourne, Florida, USA (2003)"}],"container-title":["Lecture Notes in Computer Science","Trends and Applications in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13186-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:11:23Z","timestamp":1747174283000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13186-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319131856","9783319131863"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13186-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}