{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:09:05Z","timestamp":1725556145358},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642136566"},{"type":"electronic","value":"9783642136573"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13657-3_19","type":"book-chapter","created":{"date-parts":[[2010,5,18]],"date-time":"2010-05-18T11:29:16Z","timestamp":1274182156000},"page":"158-170","source":"Crossref","is-referenced-by-count":4,"title":["Hiding Emerging Patterns with Local Recoding Generalization"],"prefix":"10.1007","author":[{"given":"Michael W. K.","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Byron Koon Kau","family":"Choi","sequence":"additional","affiliation":[]},{"given":"William Kwok Wai","family":"Cheung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"19_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.: On the design and quantification of privacy preserving data mining algorithms. In: PODS (2001)","DOI":"10.1145\/375551.375602"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Bailey, J., Manoukian, T., Ramamohanarao, K.: Fast algorithms for mining emerging patterns. In: ECML\/PKDD (2002)","DOI":"10.1007\/3-540-45681-3_4"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bayardo, J.R.: Efficiently mining long patterns from databases. In: SIGMOD (1998)","DOI":"10.1145\/276304.276313"},{"key":"19_CR5","unstructured":"Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE (2005)"},{"key":"19_CR6","unstructured":"Davenport, T.H., Harris, J.G.: Competing on Analytics: The New Science of Winning, 1st edn. Harvard Business School Press (2007)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Dong, G., Li, J.: Efficient mining of emerging patterns: Discovering trends and differences. In: SIGKDD (1999)","DOI":"10.1145\/312129.312191"},{"key":"19_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-46846-3_4","volume-title":"Discovery Science","author":"G. Dong","year":"1999","unstructured":"Dong, G., Zhang, X., Wong, L.: CAEP: Classification by aggregating emerging patterns. In: Arikawa, S., Furukawa, K. (eds.) DS 1999. LNCS (LNAI), vol.\u00a01721, p. 30. Springer, Heidelberg (1999)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Du, Y., Xia, T., Tao, Y., Zhang, D., Zhu, F.: On multidimensional k-anonymity with local recoding generalization. In: ICDE, pp. 1422\u20131424 (2007)","DOI":"10.1109\/ICDE.2007.369026"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Strikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: SIGKDD (2002)","DOI":"10.1145\/775047.775080"},{"key":"19_CR11","unstructured":"Fan, H., Ramamohanarao, K.: A Bayesian approach to use emerging patterns for classification. In: ADC (2003)"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Fung, B., Wang, K., Fu, A., Yu, P.: Privacy-Preserving Data Publishing: Concepts and Techniques. Chapman & Hall\/CRC (2010)","DOI":"10.1201\/9781420091502"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Fung, B., Wang, K., Wang, L., Debbabi, M.: A framework for privacy-preserving cluster analysis. In: ISI (2008)","DOI":"10.1109\/ISI.2008.4565028"},{"key":"19_CR14","unstructured":"Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: ICDE (2005)"},{"issue":"5","key":"19_CR15","first-page":"711","volume":"10","author":"B. Fung","year":"2007","unstructured":"Fung, B., Wang, K., Yu, P.: Anonymizing classification data for privacy preservation. TKDE\u00a010(5), 711\u2013725 (2007)","journal-title":"TKDE"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Ramamohanarao, H.F.K.: Pattern based classifiers. In: WWW (2007)","DOI":"10.1007\/s11280-006-0012-7"},{"issue":"4","key":"19_CR17","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10115-004-0173-6","volume":"7","author":"H. Kargupta","year":"2005","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random-data perturbation techniques and privacy-preserving data mining. KAIS\u00a07(4), 387\u2013414 (2005)","journal-title":"KAIS"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Dewitt, D., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: SIGMOD (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Dewitt, D., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.101"},{"issue":"9","key":"19_CR20","first-page":"1181","volume":"20","author":"J. Li","year":"2008","unstructured":"Li, J., Wong, R., Fu, A., Pei, J.: Anonymization by local recoding in data with attribute hierarchical taxonomies. TKDE\u00a020(9), 1181\u20131194 (2008)","journal-title":"TKDE"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Li, T., Li, N.: On the tradeoff between privacy and utility in data publishing. In: SIGKDD (2009)","DOI":"10.1145\/1557019.1557079"},{"issue":"1","key":"19_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., V\u00e9nkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. TKDD\u00a01(1), 3 (2007)","journal-title":"TKDD"},{"key":"19_CR23","unstructured":"MAFIA. Mining Maximal Frequent Itemsets, \n                    \n                      http:\/\/himalaya-tools.sourceforge.net\/Mafia\/"},{"issue":"1","key":"19_CR24","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.datak.2007.06.012","volume":"65","author":"G. Moustakides","year":"2008","unstructured":"Moustakides, G., Verykios, V.: A maxmin approach for hiding frequent itemsets. DKE\u00a065(1), 75\u201379 (2008)","journal-title":"DKE"},{"key":"19_CR25","unstructured":"Oliveira, S., Zaiane, O.R.: Privacy preserving frequent itemset mining. In: ICDM Workshop on Privacy, Security and Data Mining, vol.\u00a014, pp. 43\u201354 (2002)"},{"issue":"5","key":"19_CR26","first-page":"571","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. IJUFKS\u00a010(5), 571\u2013588 (2002)","journal-title":"IJUFKS"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. In: IJUFKS, pp. 557\u2013570 (2002)","DOI":"10.1142\/S0218488502001648"},{"issue":"1","key":"19_CR28","first-page":"115","volume":"1","author":"M. Terrovitis","year":"2008","unstructured":"Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. PVLDB\u00a01(1), 115\u2013125 (2008)","journal-title":"PVLDB"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Tobji, M.A.B., Abrougui, A., Yaghlane, B.B.: Gufi: A new algorithm for general updating of frequent itemsets. In: CSEWORKSHOPS (2008)","DOI":"10.1109\/CSEW.2008.38"},{"key":"19_CR30","unstructured":"UCI Machine Learning Repository. Adult Datas, \n                    \n                      http:\/\/archive.ics.uci.edu\/ml\/datasets"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Wang, Z., Fan, H., Ramamohanarao, K.: Exploiting maximal emerging patterns for classification. In: AUS-AI (2004)","DOI":"10.1007\/978-3-540-30549-1_102"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.: Utility-based anonymization using local recoding. In: SIGKDD (2006)","DOI":"10.1145\/1150402.1150504"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Xu, Y., Wang, K., Fu, A.W.-C., Yu, P.S.: Anonymizing transaction databases for publication. In: SIGKDD (2008)","DOI":"10.1145\/1401890.1401982"},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, X., Dong, G., Ramamohanarao, K.: Exploring constraints to efficiently mine emerging patterns from large high-dimensional datasets. In: SIGKDD (2000)","DOI":"10.1145\/347090.347158"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13657-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:48:26Z","timestamp":1558277306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13657-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642136566","9783642136573"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13657-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}