{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T08:10:09Z","timestamp":1751789409866,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319988115"},{"type":"electronic","value":"9783319988122"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98812-2_45","type":"book-chapter","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T12:06:43Z","timestamp":1533730003000},"page":"492-498","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Metaheuristic Algorithm for Hiding Sensitive Itemsets"],"prefix":"10.1007","author":[{"given":"Jerry Chun-Wei","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yuyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Fournier-Viger","sequence":"additional","affiliation":[]},{"given":"Youcef","family":"Djenouri","sequence":"additional","affiliation":[]},{"given":"Ji","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,9]]},"reference":[{"key":"45_CR1","first-page":"45","volume":"29","author":"M Atallah","year":"1999","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. Workshop Knowl. Data Eng. Exch. 29, 45\u201352 (1999)","journal-title":"Workshop Knowl. Data Eng. Exch."},{"issue":"2","key":"45_CR2","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Rec. 29(2), 439\u2013450 (2000)","journal-title":"ACM SIGMOD Rec."},{"key":"45_CR3","first-page":"1","volume":"4","author":"C Clifton","year":"2003","unstructured":"Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explor. 4, 1\u20137 (2003)","journal-title":"ACM SIGKDD Explor."},{"issue":"3","key":"45_CR4","doi-asserted-by":"publisher","first-page":"495","DOI":"10.3233\/IDA-160817","volume":"20","author":"P Chen","year":"2016","unstructured":"Chen, P., Lee, I., Lin, C.W., Pan, J.S.: Association rule hiding based on evolutionary multi-objective optimization. Intell. Data Anal. 20(3), 495\u2013514 (2016)","journal-title":"Intell. Data Anal."},{"key":"45_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1007\/3-540-45356-3_83","volume-title":"Parallel Problem Solving from Nature PPSN VI","author":"K Deb","year":"2000","unstructured":"Deb, K., Agrawal, S., Pratap, A., Meyarivan, T.: A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II. In: Schoenauer, M., et al. (eds.) PPSN 2000. LNCS, vol. 1917, pp. 849\u2013858. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45356-3_83"},{"key":"45_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45496-9_27","volume-title":"Information Hiding","author":"E Dasseni","year":"2001","unstructured":"Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 369\u2013383. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45496-9_27"},{"key":"45_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-319-46131-1_8","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"P Fournier-Viger","year":"2016","unstructured":"Fournier-Viger, P., et al.: The SPMF open-source data mining library version 2. In: Berendt, B., et al. (eds.) ECML PKDD 2016. LNCS (LNAI), vol. 9853, pp. 36\u201340. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46131-1_8"},{"issue":"1","key":"45_CR8","first-page":"54","volume":"1","author":"P Fournier-Viger","year":"2017","unstructured":"Fournier-Viger, P., Lin, J.C.W., Kiran, R.U., Koh, Y.S., Thomas, R.: A survey of sequential pattern mining. Data Sci. Pattern Recogn. 1(1), 54\u201377 (2017)","journal-title":"Data Sci. Pattern Recogn."},{"key":"45_CR9","unstructured":"Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H. C., Tseng, V.S., Yu, P.S.: A survey of utility-oriented pattern mining. arXiv:1805.10511 (2018)"},{"key":"45_CR10","unstructured":"Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H. C., Yu, P. S.: A survey of parallel sequential pattern mining. arXiv:1805.10515 (2018)"},{"key":"45_CR11","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1090.001.0001","volume-title":"Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence","author":"J Holland","year":"1992","unstructured":"Holland, J.: Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence. MIT Press, Cambridge (1992)"},{"key":"45_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-540-74553-2_38","volume-title":"Data Warehousing and Knowledge Discovery","author":"S Han","year":"2007","unstructured":"Han, S., Ng, W.K.: Privacy-preserving genetic algorithms for rule discovery. In: Song, I.Y., Eder, J., Nguyen, T.M. (eds.) DaWaK 2007. LNCS, vol. 4654, pp. 407\u2013417. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74553-2_38"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: IEEE International Conference on Neural Networks, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"45_CR14","doi-asserted-by":"crossref","unstructured":"Knowles, J., Corne, D.: The pareto archived evolution strategy: a new baseline algorithm for pareto multiobjective optimisation. In: The Congress on Evolutionary Computation, pp. 98\u2013105 (1999)","DOI":"10.1109\/CEC.1999.781913"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: The Annual International Cryptology Conference on Advances in Cryptology, pp. 36\u201354 (2000)","DOI":"10.1007\/3-540-44598-6_3"},{"key":"45_CR16","first-page":"13","volume":"2014","author":"CW Lin","year":"2014","unstructured":"Lin, C.W., Zhang, B., Yang, K.T., Hong, T.P.: Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci. World J. 2014, 13 (2014). Article ID 398269","journal-title":"Sci. World J."},{"issue":"2","key":"45_CR17","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/s10489-014-0590-5","volume":"42","author":"CW Lin","year":"2015","unstructured":"Lin, C.W., Hong, T.P., Yang, K.T., Wang, S.L.: The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2), 210\u2013230 (2015)","journal-title":"Appl. Intell."},{"key":"45_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.engappai.2016.03.007","volume":"53","author":"JCW Lin","year":"2016","unstructured":"Lin, J.C.W., Liu, Q., Fournier-Viger, P.: A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 53, 1\u201318 (2016)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"4","key":"45_CR19","first-page":"28","volume":"1","author":"D Marco","year":"2004","unstructured":"Marco, D., Sabrina, O., Thomas, S.: Ant colony optimization. IEEE Comput. Intell. Mag. 1(4), 28\u201339 (2004)","journal-title":"IEEE Comput. Intell. Mag."},{"key":"45_CR20","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R.: Privacy preserving frequent itemset mining. In: IEEE International Conference on Privacy, Security and Data Mining, pp. 43\u201354 (2002)"},{"issue":"4","key":"45_CR21","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn, R., Price, K.: Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 11(4), 341\u2013359 (1997)","journal-title":"J. Glob. Optim."},{"key":"45_CR22","unstructured":"Schaffer, J.D.: Multiple objective optimization with vector evaluated genetic algorithms. In: International Conference on Genetic Algorithms, vol. 2, no. 1, pp. 93\u2013100 (1985)"},{"issue":"3","key":"45_CR23","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1162\/evco.1994.2.3.221","volume":"2","author":"N Srinivas","year":"1994","unstructured":"Srinivas, N., Deb, K.: Multiobjective optimization using nondominated sorting in genetic algorithms. Evol. Comput. 2(3), 221\u2013248 (1994)","journal-title":"Evol. Comput."},{"key":"45_CR24","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"VS Verykios","year":"2004","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Rec. 33, 50\u201357 (2004)","journal-title":"ACM SIGMOD Rec."},{"issue":"4","key":"45_CR25","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/4235.797969","volume":"3","author":"E Zitzler","year":"1999","unstructured":"Zitzler, E., Thiele, L.: Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach. IEEE Trans. Evol. Comput. 3(4), 257\u2013271 (1999)","journal-title":"IEEE Trans. Evol. Comput."}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98812-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T07:41:06Z","timestamp":1751787666000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-98812-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319988115","9783319988122"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98812-2_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"9 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Regensburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}