{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T12:10:01Z","timestamp":1748607001821,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319232065"},{"type":"electronic","value":"9783319232072"}],"license":[{"start":{"date-parts":[[2015,9,4]],"date-time":"2015-09-04T00:00:00Z","timestamp":1441324800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,9,4]],"date-time":"2015-09-04T00:00:00Z","timestamp":1441324800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-23207-2_6","type":"book-chapter","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T07:37:30Z","timestamp":1441265850000},"page":"47-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Sanitization Approach of Privacy Preserving Utility Mining"],"prefix":"10.1007","author":[{"given":"Jerry Chun-Wei","family":"Lin","sequence":"first","affiliation":[]},{"given":"Tsu-Yang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Fournier-Viger","sequence":"additional","affiliation":[]},{"given":"Guo","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Tzung-Pei","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,4]]},"reference":[{"key":"6_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: The International Conference on Very Large Data Bases, pp. 487\u2013499 (1994)"},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Record 29(2), 439\u2013450 (2000)","journal-title":"ACM SIGMOD Record"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.dss.2006.08.007","volume":"43","author":"A Amiri","year":"2007","unstructured":"Amiri, A.: Dare to share: Protecting sensitive knowledge with data sanitization. Decision Support Systems 43(1), 181\u2013191 (2007)","journal-title":"Decision Support Systems"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Atallah, M., Elmagarmid, A., Ibrahim, M., Bertino, E., Verykios, V.: Disclosure limitation of sensitive rules. In: The Workshop on Knowledge and Data Engineering Exchange, pp. 45\u201352 (1999)","DOI":"10.1109\/KDEX.1999.836532"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10618-005-0006-6","volume":"11","author":"E Bertino","year":"2005","unstructured":"Bertino, E., Fovino, I.N., Provenza, L.P.: A framework for evaluating privacy preserving data mining algorithms. Data Mining and Knowledge Discovery 11(2), 121\u2013154 (2005)","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"6","key":"6_CR6","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/69.553155","volume":"8","author":"MS Chen","year":"1996","unstructured":"Chen, M.S., Han, J., Yu, P.S.: Data mining: An overview from a database perspective. IEEE Transactions on Knowledge and Data Engineering 8(6), 866\u2013883 (1996)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45496-9_27","volume-title":"Information Hiding","author":"E Dasseni","year":"2001","unstructured":"Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 369\u2013383. Springer, Heidelberg (2001)"},{"key":"6_CR8","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Fast algorithms for mining association rules in large databases. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 217\u2013228 (2002)"},{"key":"6_CR9","first-page":"3389","volume":"15","author":"P Fournier-Viger","year":"2014","unstructured":"Fournier-Viger, P., Gomariz, A., Gueniche, T., Soltani, A., Wu, C.W., Tseng, V.S.: SPMF: a Java Open-Source Pattern Mining Library. Journal of Machine Learning Research 15, 3389\u20133393 (2014)","journal-title":"Journal of Machine Learning Research"},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/JSYST.2012.2221854","volume":"7","author":"F Giannotti","year":"2012","unstructured":"Giannotti, F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H.W.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Systems Journal 7(3), 385\u2013395 (2012)","journal-title":"IEEE Systems Journal"},{"key":"6_CR11","unstructured":"Goethals, B., Zaki, M.J.: Frequent itemset mining implementations repository (2012). http:\/\/fimi.ua.ac.be\/data\/"},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1023\/B:DAMI.0000005258.31418.83","volume":"8","author":"J Han","year":"2004","unstructured":"Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Mining and Knowledge Discovery 8(1), 53\u201387 (2004)","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/s10489-012-0377-5","volume":"38","author":"TP Hong","year":"2013","unstructured":"Hong, T.P., Lin, C.W., Yang, K.T., Wang, S.L.: Using TF-IDF to hide sensitive itemsets. Applied Intelligence 38(4), 502\u2013510 (2013)","journal-title":"Applied Intelligence"},{"issue":"9","key":"6_CR14","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TKDE.2006.136","volume":"18","author":"XB Li","year":"2006","unstructured":"Li, X.B., Sarkar, S.: A tree-based data perturbation approach for privacy-preserving data mining. IEEE Transactions on Knowledge and Data Engineering 18(9), 1278\u20131283 (2006)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"6_CR15","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.aei.2006.12.003","volume":"21","author":"YC Li","year":"2007","unstructured":"Li, Y.C., Yeh, J.S., Chang, C.C.: MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining. Advanced Engineering Informatics 21(3), 269\u2013280 (2007)","journal-title":"Advanced Engineering Informatics"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: International Cryptology Conference on Advances in Cryptology, 36\u201354 (2000)","DOI":"10.1007\/3-540-44598-6_3"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/11430919_79","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Y Liu","year":"2005","unstructured":"Liu, Y., Liao, W., Choudhary, A.K.: A two-phase algorithm for fast discovery of high utility itemsets. In: Ho, T.-B., Cheung, D., Liu, H. (eds.) PAKDD 2005. LNCS (LNAI), vol. 3518, pp. 689\u2013695. Springer, Heidelberg (2005)"},{"issue":"6","key":"6_CR18","doi-asserted-by":"publisher","first-page":"7419","DOI":"10.1016\/j.eswa.2010.12.082","volume":"38","author":"CW Lin","year":"2011","unstructured":"Lin, C.W., Hong, T.P., Lu, W.H.: An effective tree structure for mining high utility itemsets. Expert Systems with Applications 38(6), 7419\u20137424 (2011)","journal-title":"Expert Systems with Applications"},{"key":"6_CR19","first-page":"1","volume":"2014","author":"CW Lin","year":"2014","unstructured":"Lin, C.W., Zhang, B., Yang, K.T., Hong, T.P.: Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. The Scientific World Journal 2014, 1\u201313 (2014)","journal-title":"The Scientific World Journal"},{"key":"6_CR20","first-page":"1","volume":"2014","author":"CW Lin","year":"2014","unstructured":"Lin, C.W., Hong, T.P., Wong, J.W., Lan, G.C., Lin, W.Y.: A GA-Based approach to hide sensitive high utility itemsets. The Scientific World Journal 2014, 1\u201312 (2014)","journal-title":"The Scientific World Journal"},{"key":"6_CR21","unstructured":"Sun, X., Yu, P.S.: A border-based approach for hiding sensitive frequent itemsets. In: IEEE International Conference on Data Mining, pp. 27\u201330 (2005)"},{"issue":"4","key":"6_CR22","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"VS Verykios","year":"2004","unstructured":"Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. IEEE Transactions on Knowledge and Data Engineering 16(4), 434\u2013447 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"6_CR23","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"VS Verykios","year":"2004","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 33(1), 50\u201357 (2004)","journal-title":"ACM SIGMOD Record"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Yao, H., Hamilton, H.J., Butz, C.J.: A foundational approach to mining itemset utilities from databases. In: SIAM International Conference on Data Mining, pp. 482\u2013486 (2004)","DOI":"10.1137\/1.9781611972740.51"},{"issue":"3","key":"6_CR25","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1016\/j.datak.2005.10.004","volume":"59","author":"H Yao","year":"2006","unstructured":"Yao, H., Hamilton, H.J.: Mining itemset utilities from transaction databases. Data and Knowledge Engineering 59(3), 603\u2013626 (2006)","journal-title":"Data and Knowledge Engineering"},{"issue":"7","key":"6_CR26","doi-asserted-by":"publisher","first-page":"4779","DOI":"10.1016\/j.eswa.2009.12.038","volume":"37","author":"JS Yeh","year":"2010","unstructured":"Yeh, J.S., Hsu, P.C.: HHUIF and MSICF: Novel algorithms for privacy preserving utility mining. Expert Systems with Applications 37(7), 4779\u20134786 (2010)","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"6_CR27","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1016\/j.eswa.2014.08.037","volume":"42","author":"U Yun","year":"2015","unstructured":"Yun, U., Kim, J.: A fast perturbation algorithm using tree structure for privacy preserving utility mining. Expert Systems with Applications 42(3), 1149\u20131165 (2015)","journal-title":"Expert Systems with Applications"}],"container-title":["Advances in Intelligent Systems and Computing","Genetic and Evolutionary Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23207-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T11:36:25Z","timestamp":1748604985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23207-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,4]]},"ISBN":["9783319232065","9783319232072"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23207-2_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,9,4]]},"assertion":[{"value":"4 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}