{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:57Z","timestamp":1750308237374,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662549698"},{"type":"electronic","value":"9783662549704"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-54970-4_27","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T02:02:55Z","timestamp":1494900175000},"page":"460-473","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Sensitivity-Adaptive $$\\rho $$-Uncertainty Model for Set-Valued Data"],"prefix":"10.1007","author":[{"given":"Liuhua","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shenghai","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Li-e","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xianxian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Saygin, Y., Verykios, V.S., Elmagarmid, A.K.: Privacy preserving association rule mining. In: 2002 Proceedings of the Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce\/E-Business Systems, RIDE-2EC 2002, pp. 151\u2013158. IEEE (2002)","DOI":"10.1109\/RIDE.2002.995109"},{"issue":"12","key":"27_CR2","first-page":"3096","volume":"8","author":"J Han","year":"2013","unstructured":"Han, J., Luo, F., Lu, J., Peng, H.: Sloms: A privacy preserving data publishing method for multiple sensitive attributes microdata. J. Softw. 8(12), 3096\u20133104 (2013)","journal-title":"J. Softw."},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: M-invariance: Towards privacy preserving re-publication of dynamic datasets. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, pp. 689\u2013700. ACM (2007)","DOI":"10.1145\/1247480.1247556"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Tao, Y., Kalnis, P.: On the anonymization of sparse high-dimensional data. In: 2008 IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 715\u2013724. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497480"},{"issue":"1","key":"27_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s11390-012-1203-6","volume":"27","author":"JQ Liu","year":"2012","unstructured":"Liu, J.Q.: Publishing set-valued data against realistic adversaries. J. Comput. Sci. Technol. 27(1), 24\u201336 (2012)","journal-title":"J. Comput. Sci. Technol."},{"issue":"1\u20132","key":"27_CR6","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.14778\/1920841.1920971","volume":"3","author":"J Cao","year":"2010","unstructured":"Cao, J., Karras, P., Ra\u00efssi, C., Tan, K.L.: $$\\rho $$-uncertainty: Inference-proof transaction anonymization. Proc. VLDB Endow. 3(1\u20132), 1033\u20131044 (2010)","journal-title":"Proc. VLDB Endow."},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-319-05813-9_13","volume-title":"Database Systems for Advanced Applications","author":"X Jia","year":"2014","unstructured":"Jia, X., Pan, C., Xu, X., Zhu, K.Q., Lo, E.: $$\\rho $$\u2013uncertainty anonymization by partial suppression. In: Bhowmick, S.S., Dyreson, C.E., Jensen, C.S., Lee, M.L., Muliantara, A., Thalheim, B. (eds.) DASFAA 2014. LNCS, vol. 8422, pp. 188\u2013202. Springer, Cham (2014). doi:10.1007\/978-3-319-05813-9_13"},{"key":"27_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/978-3-642-31552-7_59","volume-title":"Advances in Computing and Information Technology","author":"B Tripathy","year":"2013","unstructured":"Tripathy, B., Reddy, A.J., Manusha, G., Mohisin, G.: Improved algorithms for anonymization of set-valued data. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol. 177, pp. 581\u2013594. Springer, Heidelberg (2013)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 639\u2013644. ACM (2002)","DOI":"10.1145\/775047.775142"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Fung, B., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: 2005 Proceedings. 21st International Conference on Data Engineering, ICDE 2005, pp. 205\u2013216. IEEE (2005)","DOI":"10.1109\/ICDE.2005.143"},{"issue":"05","key":"27_CR11","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"issue":"1","key":"27_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.14778\/1453856.1453874","volume":"1","author":"M Terrovitis","year":"2008","unstructured":"Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. Proc. VLDB Endow. 1(1), 115\u2013125 (2008)","journal-title":"Proc. VLDB Endow."},{"issue":"1","key":"27_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discovery Data (TKDD) 1(1), 3 (2007)","journal-title":"ACM Trans. Knowl. Discovery Data (TKDD)"},{"key":"27_CR14","unstructured":"Lin, S., Liao, M.: Towards publishing set-valued data with high utility (2014)"},{"issue":"07","key":"27_CR15","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1142\/S0218194014500363","volume":"24","author":"L Wang","year":"2014","unstructured":"Wang, L., Li, X.: A clustering-based bipartite graph privacy-preserving approach for sharing high-dimensional data. Int. J. Softw. Eng. Knowl. Eng. 24(07), 1091\u20131111 (2014)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"11","key":"27_CR16","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.14778\/3402707.3402744","volume":"4","author":"R Chen","year":"2011","unstructured":"Chen, R., Mohammed, N., Fung, B.C., Desai, B.C., Xiong, L.: Publishing set-valued data via differential privacy. Proc. VLDB Endow. 4(11), 1087\u20131098 (2011)","journal-title":"Proc. VLDB Endow."},{"key":"27_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-11116-2_3","volume-title":"Web Technologies and Applications","author":"X Xiao","year":"2014","unstructured":"Xiao, X.: Differentially private data release: Improving utility with wavelets and bayesian networks. In: Chen, L., Jia, Y., Sellis, T., Liu, G. (eds.) APWeb 2014. LNCS, vol. 8709, pp. 25\u201335. Springer, Cham (2014). doi:10.1007\/978-3-319-11116-2_3"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Xu, Y., Wang, K., Fu, A.W.C., Yu, P.S.: Anonymizing transaction databases for publication. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 767\u2013775. ACM (2008)","DOI":"10.1145\/1401890.1401982"},{"key":"27_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-642-15364-8_34","volume-title":"Database and Expert Systems Applications","author":"G Loukides","year":"2010","unstructured":"Loukides, G., Gkoulalas-Divanis, A., Shao, J.: Anonymizing transaction data to eliminate sensitive inferences. In: Bringas, P.G., Hameurlain, A., Quirchmayr, G. (eds.) DEXA 2010. LNCS, vol. 6261, pp. 400\u2013415. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-15364-8_34"},{"key":"27_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-642-00887-0_42","volume-title":"Database Systems for Advanced Applications","author":"Y Ye","year":"2009","unstructured":"Ye, Y., Liu, Y., Wang, C., Lv, D., Feng, J.: Decomposition: Privacy preservation for multiple sensitive attributes. In: Zhou, X., Yokota, H., Deng, K., Liu, Q. (eds.) DASFAA 2009. LNCS, vol. 5463, pp. 486\u2013490. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-00887-0_42"},{"issue":"4","key":"27_CR21","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"VS Verykios","year":"2004","unstructured":"Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. IEEE Trans. Knowl. Data Eng. 16(4), 434\u2013447 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"27_CR22","doi-asserted-by":"publisher","first-page":"934","DOI":"10.14778\/1687627.1687733","volume":"2","author":"Y He","year":"2009","unstructured":"He, Y., Naughton, J.F.: Anonymization of set-valued data via top-down, local generalization. Proc. VLDB Endow. 2(1), 934\u2013945 (2009)","journal-title":"Proc. VLDB Endow."},{"issue":"4","key":"27_CR23","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1007\/s10489-014-0554-9","volume":"41","author":"SL Wang","year":"2014","unstructured":"Wang, S.L., Tsai, Y.C., Kao, H.Y., Hong, T.P.: On anonymizing transactions with sensitive items. Appl. Intell. 41(4), 1043\u20131058 (2014)","journal-title":"Appl. Intell."},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Gkoulalas-Divanis, A., Loukides, G.: PCTA: Privacy-constrained clustering-based transaction data anonymization. In: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, vol. 5. ACM (2011)","DOI":"10.1145\/1971690.1971695"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-54970-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:34:00Z","timestamp":1750264440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-54970-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662549698","9783662549704"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-54970-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Christ Church","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barbados","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fc16.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}