{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:46:58Z","timestamp":1725518818863},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881919"},{"type":"electronic","value":"9783540881926"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88192-6_12","type":"book-chapter","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T08:05:59Z","timestamp":1222675559000},"page":"111-122","source":"Crossref","is-referenced-by-count":4,"title":["Data Quality in Privacy Preservation for Associative Classification"],"prefix":"10.1007","author":[{"given":"Nattapon","family":"Harnsamut","sequence":"first","affiliation":[]},{"given":"Juggapong","family":"Natwichai","sequence":"additional","affiliation":[]},{"given":"Xingzhi","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010, 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1145\/775047.775089","volume-title":"Proceedings of the Eighth ACM International Conference on Knowledge Discovery and Data Mining","author":"V.S. Iyengar","year":"2002","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the Eighth ACM International Conference on Knowledge Discovery and Data Mining, pp. 279\u2013288. ACM, New York (2002)"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010, 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013, 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"12_CR5","first-page":"205","volume-title":"Proceedings of the IEEE International Conference on Data Engineering","author":"B.C.M. Fung","year":"2005","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: Proceedings of the IEEE International Conference on Data Engineering, pp. 205\u2013216. IEEE Computer Society, Los Alamitos (2005)"},{"key":"12_CR6","first-page":"80","volume-title":"Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining","author":"B. Liu","year":"1998","unstructured":"Liu, B., Hsu, W., Ma, Y.: Integrating classification and association rule mining. In: Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining, pp. 80\u201386. AAAI Press, Menlo Park (1998)"},{"key":"12_CR7","first-page":"369","volume-title":"Proceedings of the IEEE International Conference on Data Mining, Washington, DC, USA","author":"W. Li","year":"2001","unstructured":"Li, W., Han, J., Pei, J.: Cmar: Accurate and efficient classification based on multiple class-association rules. In: Proceedings of the IEEE International Conference on Data Mining, Washington, DC, USA, pp. 369\u2013376. IEEE Computer Society, Los Alamitos (2001)"},{"key":"12_CR8","first-page":"207","volume-title":"Proceedings of the ACM International Conference on Management of Data","author":"R. Agrawal","year":"1993","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the ACM International Conference on Management of Data, pp. 207\u2013216. ACM Press, New York (1993)"},{"key":"12_CR9","first-page":"223","volume-title":"Proceedings of the ACM Symposium on Principles of Database Systems","author":"A. Meyerson","year":"2004","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceedings of the ACM Symposium on Principles of Database Systems, pp. 223\u2013228. ACM, New York (2004)"},{"key":"12_CR10","first-page":"217","volume-title":"Proceedings of the IEEE International Conference on Data Engineering","author":"R.J. Bayardo Jr.","year":"2005","unstructured":"Bayardo Jr., R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of the IEEE International Conference on Data Engineering, pp. 217\u2013228. IEEE Computer Society, Los Alamitos (2005)"},{"key":"12_CR11","first-page":"380","volume-title":"Proceedings of the Symposium on Applied Computing","author":"T.M. Truta","year":"2007","unstructured":"Truta, T.M., Campan, A.: K-anonymization incremental maintenance and optimization techniques. In: Proceedings of the Symposium on Applied Computing, pp. 380\u2013387. ACM, New York (2007)"},{"key":"12_CR12","first-page":"24","volume-title":"Proceedings of the International Conference on Data Engineering, Washington, DC, USA","author":"A. Machanavajjhala","year":"2006","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: \u2113-diversity: Privacy beyond \u03ba-anonymity. In: Proceedings of the International Conference on Data Engineering, Washington, DC, USA, p. 24. IEEE Computer Society, Los Alamitos (2006)"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1145\/1150402.1150499","volume-title":"Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining","author":"R.C.W. Wong","year":"2006","unstructured":"Wong, R.C.W., Li, J., Fu, A.W.C., Wang, K. (\u03b1, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining, pp. 754\u2013759. ACM Press, New York (2006)"},{"key":"12_CR14","first-page":"49","volume-title":"Proceedings of the ACM International Conference on Management of Data","author":"K. LeFevre","year":"2005","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the ACM International Conference on Management of Data, pp. 49\u201360. ACM Press, New York (2005)"},{"key":"12_CR15","unstructured":"Blake, C., Merz, C.: UCI repository of machine learning databases (1998)"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88192-6_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:57:36Z","timestamp":1619524656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88192-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881919","9783540881926"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88192-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}