{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:54:08Z","timestamp":1725490448545},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749752"},{"type":"electronic","value":"9783540749769"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74976-9_13","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T10:52:35Z","timestamp":1188384755000},"page":"103-114","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Preserving Market Basket Data Analysis"],"prefix":"10.1007","author":[{"given":"Ling","family":"Guo","sequence":"first","affiliation":[]},{"given":"Songtao","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xintao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Agrawal, C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the 20th Symposium on Principles of Database Systems (2001)","DOI":"10.1145\/375551.375602"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 439\u2013450. Dallas, Texas (May 2000)","DOI":"10.1145\/342009.335438"},{"key":"13_CR3","first-page":"193","volume-title":"Proceedings of the 21st IEEE International Conference on Data Engineering","author":"S. Agrawal","year":"2005","unstructured":"Agrawal, S., Haritsa, J.: A framework for high-accuracy privacy-preserving mining. In: Proceedings of the 21st IEEE International Conference on Data Engineering, pp. 193\u2013204. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-3-540-24571-1_9","volume-title":"Database Systems for Advanced Applications","author":"S. Agrawal","year":"2004","unstructured":"Agrawal, S., Krishnan, V., Haritsa, J.: On addressing efficiency concerns in privacy-preserving mining. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol.\u00a02973, pp. 113\u2013124. Springer, Heidelberg (2004)"},{"key":"13_CR5","unstructured":"Chaudhuri, A., Mukerjee, R.: Randomized Response Theory and Techniques. Marcel Dekker (1988)"},{"key":"13_CR6","unstructured":"Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proceedings of the 5th IEEE International Conference on Data Mining. Houston,TX (November 2005)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Dasseni, E., Verykios, V., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: Proceedings of the 4th International Information Hiding Workshop, pp. 369\u2013383. Pittsburg, PA (April 2001)","DOI":"10.1007\/3-540-45496-9_27"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/773153.773174","volume-title":"Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems","author":"A. Evfimievski","year":"2003","unstructured":"Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp. 211\u2013222. ACM Press, New York (2003)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 217\u2013228 (2002)","DOI":"10.1145\/775047.775080"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Gionis, A., Mannila, H., Mielikainen, T., Tsaparas, P.: Assessing data mining results via swap randomization. In: Proceedings of the 12th ACM International Conference on Knowledge Discovery and Data Mining (2006)","DOI":"10.1145\/1150402.1150424"},{"key":"13_CR11","unstructured":"Guo, L., Guo, S., Wu, X.: On addressing accuracy concerns in privacy preserving association rule mining. Technical Report, CS Dept. UNC Charlotte (March 2007)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Guo, S., Wu, X.: On the lower bound of reconstruction error for spectral filtering based privacy preserving data mining. In: Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, pp. 520\u2013527. Berlin, Germany (September 2006)","DOI":"10.1007\/11871637_51"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Guo, S., Wu, X.: On the use of spectral filtering for privacy preserving data mining. In: Proceedings of the 21st ACM Symposium on Applied Computing, pp. 622\u2013626 (April 2006)","DOI":"10.1145\/1141277.1141418"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Guo, S., Wu, X.: Deriving private information from arbitraraily projected data. In: Proceedings of the 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 84\u201395. Nanjing, China, (May 2007)","DOI":"10.1007\/978-3-540-71701-0_11"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the ACM SIGMOD Conference on Management of Data, Baltimore, MA (2005)","DOI":"10.1145\/1066157.1066163"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the 3rd International Conference on Data Mining, pp. 99\u2013106 (2003)","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"13_CR17","volume-title":"The advanced theory of statistics","author":"M.G. Kendall","year":"1969","unstructured":"Kendall, M.G., Stuart, A.: The advanced theory of statistics. Hafner Pub. Co., New York (1969)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Liu, K., Giannella, C., Kargupta, H.: An attacker\u2019s view of distance preserving maps for privacy preserving data mining. In: Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases. Berlin, Germany (September 2006)","DOI":"10.1007\/11871637_30"},{"issue":"1","key":"13_CR19","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K. Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random projection based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transaction on Knowledge and Data Engineering\u00a018(1), 92\u2013106 (2006)","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Oliveira, S., Zaiane, O.: Protecting sensitive knowledge by data sanitization. In: Proceedings of the 3rd IEEE International Conference on Data Mining, pp. 211\u2013218. Melbourne, Florida (November 2003)","DOI":"10.1109\/ICDM.2003.1250990"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Haritsa, J.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th International Conference on Very Large Data Bases (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"13_CR22","unstructured":"Silverstein, C., Brin, S., Motwani, R., Ullman, J.: Scalable techniques for mining causal structures. In: Proceedings of the 24th VLDB Conference. New York (1998)"},{"key":"13_CR23","volume-title":"Introuduction to Data Mining","author":"P. Tan","year":"2006","unstructured":"Tan, P., Steinbach, M., Kumar, K.: Introuduction to Data Mining. Addison-Wesley, Reading (2006)"}],"container-title":["Lecture Notes in Computer Science","Knowledge Discovery in Databases: PKDD 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74976-9_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:50:05Z","timestamp":1619520605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74976-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540749752","9783540749769"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74976-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}