{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:08:57Z","timestamp":1725556137837},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642136566"},{"type":"electronic","value":"9783642136573"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13657-3_20","type":"book-chapter","created":{"date-parts":[[2010,5,18]],"date-time":"2010-05-18T15:29:16Z","timestamp":1274196556000},"page":"171-180","source":"Crossref","is-referenced-by-count":22,"title":["Anonymizing Transaction Data by Integrating Suppression and Generalization"],"prefix":"10.1007","author":[{"given":"Junqiang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules between Sets of Items in Large Databases. In: SIGMOD 1993 (1993)","DOI":"10.1145\/170035.170072"},{"key":"20_CR2","unstructured":"Barbaro, M., Zeller, T.: A Face Is Exposed for AOL Searcher No. 4417749. New York Times (August 9, 2006)"},{"key":"20_CR3","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7287.001.0001","volume-title":"WordNet, An Electronic Lexical Database","author":"C. Fellbaum","year":"1998","unstructured":"Fellbaum, C.: WordNet, An Electronic Lexical Database. MIT Press, Cambridge (1998)"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Tao, Y., Kalnis, P.: On the Anonymization of Sparse High-Dimensional Data. In: ICDE 2008 (2008)","DOI":"10.1109\/ICDE.2008.4497480"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"He, Y., Naughton, J.: Anonymization of Set-valued Data via Top-down Local Generalization. In: VLDB 2009 (2009)","DOI":"10.14778\/1687627.1687733"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Iyengar, V.: Transforming Data to Satisfy Privacy Constraints. In: KDD 2002 (2002)","DOI":"10.1145\/775047.775089"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian Multidimensional k-Anonymity. In: ICDE 2006 (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Liu, J., Wang, K.: On Optimal Anonymization for l \u2009+\u2009-Diversity. In: ICDE 2010 (2010)","DOI":"10.1109\/ICDE.2010.5447898"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy beyond k-Anonymity. In: ICDE 2006 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"20_CR10","unstructured":"Narayanan, A., Shmatikov, V.: How to Break Anonymity of the Netflix Prize Dataset. ArXiv Computer Science e-prints (October 2006)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Pass, G., Chowdhury, A., Torgeson, C.: A Picture of Search. In: The 1st Intl. Conf. on Scalable Information Systems, Hong Kong (June 2006)","DOI":"10.1145\/1146847.1146848"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing Data to Provide Anonymity When Disclosing Information. In: PODS 1998 (1998)","DOI":"10.1145\/275487.275508"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy Preserving Anonymization of Set-valued Data. In: VLDB 2008 (2008)","DOI":"10.14778\/1453856.1453874"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Xu, Y., Wang, K., Fu, A., Yu, P.S.: Anonymizing Transaction Databases for Publication. In: KDD 2008 (2008)","DOI":"10.1145\/1401890.1401982"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Kohavi, R., Mason, L.: Real World Performance of Association Rule Algorithms. In: KDD 2001 (2001)","DOI":"10.1145\/502512.502572"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13657-3_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:41:10Z","timestamp":1606185670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13657-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642136566","9783642136573"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13657-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}