{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:59:17Z","timestamp":1725512357026},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540681243"},{"type":"electronic","value":"9783540681250"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68125-0_13","type":"book-chapter","created":{"date-parts":[[2008,5,10]],"date-time":"2008-05-10T07:40:05Z","timestamp":1210405205000},"page":"124-135","source":"Crossref","is-referenced-by-count":0,"title":["On Addressing Accuracy Concerns in Privacy Preserving Association Rule Mining"],"prefix":"10.1007","author":[{"given":"Ling","family":"Guo","sequence":"first","affiliation":[]},{"given":"Songtao","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xintao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Agrawal, C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the 20th Symposium on Principles of Database Systems (2001)","DOI":"10.1145\/375551.375602"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Dallas, Texas, May 2000, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Haritsa, J.: A framework for high-accuracy privacy-preserving mining. In: Proceedings of the 21st IEEE International Conference on Data Engineering, pp. 193\u2013204 (2005)","DOI":"10.1109\/ICDE.2005.8"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-3-540-24571-1_9","volume-title":"Database Systems for Advanced Applications","author":"S. Agrawal","year":"2004","unstructured":"Agrawal, S., Krishnan, V., Haritsa, J.: On addressing efficiency concerns in privacy-preserving mining. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol.\u00a02973, pp. 113\u2013124. Springer, Heidelberg (2004)"},{"key":"13_CR5","volume-title":"Randomized Response Theory and Techniques","author":"A. Chaudhuri","year":"1988","unstructured":"Chaudhuri, A., Mukerjee, R.: Randomized Response Theory and Techniques. Marcel Dekker, New York (1988)"},{"issue":"2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1111\/j.1751-5823.2002.tb00363.x","volume":"70","author":"A.V. Hout den","year":"2002","unstructured":"den Hout, A.V., der Heijden, P.G.M.V.: Randomized response, statistical disclosure control and misclassification: A review. International Statistical Review\u00a070(2), 269\u2013288 (2002)","journal-title":"International Statistical Review"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp. 211\u2013222 (2003)","DOI":"10.1145\/773153.773174"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 217\u2013228 (2002)","DOI":"10.1145\/775047.775080"},{"key":"13_CR9","unstructured":"Guo, L., Guo, S., Wu, X.: On addressing accuracy concerns in privacy preserving association rule mining. Technical Report, CS Dept., UNC Charlotte (March 2007)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the ACM SIGMOD Conference on Management of Data, Baltimore, MA (2005)","DOI":"10.1145\/1066157.1066163"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the 3rd International Conference on Data Mining, pp. 99\u2013106 (2003)","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"13_CR12","volume-title":"The advanced theory of statistics","author":"M.G. Kendall","year":"1969","unstructured":"Kendall, M.G., Stuart, A.: The advanced theory of statistics, vol.\u00a01. Hafner Pub. Co., New York (1969)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Haritsa, J.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th International Conference on Very Large Data Bases (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"13_CR14","volume-title":"The Algebra of Random Variables","author":"M.D. Springer","year":"1979","unstructured":"Springer, M.D.: The Algebra of Random Variables. John Wiley and Sons, New York (1979)"},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.2307\/2283137","volume":"60","author":"S. Warner","year":"1965","unstructured":"Warner, S.: Randomized response: a survey technique for eliminating evasive answer bias. J. Amer. Statist. Assoc.\u00a060, 63\u201369 (1965)","journal-title":"J. Amer. Statist. Assoc."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Wu, X., Barbar\u00e1, D., Ye, Y.: Screening and interpreting multi-item associations based on log-linear modeling. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washinton, August 2003, pp. 276\u2013285 (2003)","DOI":"10.1145\/956750.956783"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68125-0_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:36:27Z","timestamp":1620016587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68125-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540681243","9783540681250"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68125-0_13","relation":{},"subject":[]}}