{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T13:23:57Z","timestamp":1775309037284,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811315916","type":"print"},{"value":"9789811315923","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T00:00:00Z","timestamp":1544745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1592-3_19","type":"book-chapter","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T17:26:17Z","timestamp":1544721977000},"page":"249-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Association Rule Hiding Using Chemical Reaction Optimization"],"prefix":"10.1007","author":[{"given":"N. P.","family":"Gopalan","sequence":"first","affiliation":[]},{"given":"T. Satyanarayana","family":"Murthy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,14]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: ACM SIGMOD International Conference on Management of Data SIGMOD, p. 207 (1993)","DOI":"10.1145\/170036.170072"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Hahsler, M., Grun, B., Hornik, K.: Arules\u2014A computational environment for mining association rules and frequent itemsets. J. Stat. Softw. (2005)","DOI":"10.18637\/jss.v014.i15"},{"key":"19_CR3","unstructured":"Tan, P.-N., Steinbach, M., Kumar, V.: Association analysis: basic concepts and algorithms. In: Introduction to Data Mining (2005)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Lam, A.Y.S., Li, V.O.K.: Chemical reaction optimization (2012)","DOI":"10.1007\/s12293-012-0075-1"},{"issue":"3","key":"19_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TEVC.2011.2161091","volume":"16","author":"Albert Y. S. Lam","year":"2012","unstructured":"Lam, A.Y.S., Li, V.O.K.: Real Coded Chemical reaction optimization. IEEE Trans. Evol. Comput. 16(3), 339\u2013353 (2012)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules, pp. 45\u201352 (1999)","DOI":"10.1109\/KDEX.1999.836532"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45496-9_27","volume-title":"Information Hiding","author":"Elena Dasseni","year":"2001","unstructured":"Dasseni, E., Verkios, V.S., Elmagarmid, A.K., Bernito, E.: Hiding association rules by using confidence and support, pp. 369\u2013383 (2000)"},{"issue":"4","key":"19_CR8","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"V.S. Verykios","year":"2004","unstructured":"Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. Trans. Knowl. Data Eng. 16(4), 434\u2013447 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"19_CR9","unstructured":"Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving frequent itemset mining (2002)"},{"issue":"2","key":"19_CR10","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.eswa.2006.05.022","volume":"33","author":"Shyue-Liang Wang","year":"2007","unstructured":"Wang: Hiding informative association rules sets. Expert Syst. Appl. 33(2), 316\u2013323 (2007)","journal-title":"Expert Systems with Applications"},{"key":"19_CR11","unstructured":"Shah, K., Thakkar, A., Ganatra, A.: Association rule hiding by heuristic approach to reduce side effects and hide multiple R.H.S. Int. J. Comput. Appl. 45(1), 1\u20137 (2012)"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Damandiya, N.H., Rao, U.P.: Hiding sensitive association rules to maintain privacy and data quality in database, pp. 1306\u20131310 (2013)","DOI":"10.1109\/IAdCC.2013.6514417"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Hong, T.-P., Lin, C.-W., Yang, K.-T., Wang, S.L.: A heuristic data-sanitization approach based on SIF-IDF (2011)","DOI":"10.1109\/ICSMC.2011.6084025"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Lin, C.-W., Hong, T.-P., Hsu, H.C.: Reducing side effects of hiding sensitive item sets in privacy preserving data mining. Sci. World J. (2014)","DOI":"10.1155\/2014\/235837"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Ghalehsefidi, N.J., Dehkordi, M.N.: A hybrid algorithm based on heuristic method to preserve privacy in association rule mining. Indian J. Sci. Technol. 9(27) (2016)","DOI":"10.17485\/ijst\/2016\/v9i27\/97476"},{"key":"19_CR16","unstructured":"Belwal, R., Varshney, J., Khan, S.: Hiding sensitive association rules efficiently by introducing new variable hiding counter (2013)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Modi, C.N., Rao, U.P., Patel, D.R.: Maintaining privacy and data quality in privacy preserving association rule mining (2010)","DOI":"10.1109\/ICCCNT.2010.5592589"},{"key":"19_CR18","unstructured":"Modi, C.N., Rao, U.P., Patel, D.R.: An efficient solution for privacy preserving association rule mining. Int. J. Comput. Netw. 2(5), 79\u201385 (2010)"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Kesava Murthy, B., Khan, A.M.: Privacy preserving association rule mining over distributed databases using genetic algorithm. Neural Comput. Appl. 22(1), S351\u2013S364 (2013)","DOI":"10.1007\/s00521-013-1343-9"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.engappai.2016.03.007","volume":"53","author":"Jerry Chun-Wei Lin","year":"2016","unstructured":"Lin, J.C.W,: A sanitization approach for hiding sensitive Itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 53, 1\u201318 (2016)","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"19_CR21","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.eswa.2016.08.005","volume":"64","author":"Mahtab Hossein Afshari","year":"2016","unstructured":"Afshari, M.H.: Association rule hiding using cuckoo optimization algorithm. Expert Syst. Appl. 64,340\u2013351 (2016)","journal-title":"Expert Systems with Applications"},{"key":"19_CR22","unstructured":"Satyanarayana Murthy, T.: Pine Apple Expert System Using Improved C4.5 Algorithm, pp. 1264\u20131266 (2013)"},{"key":"19_CR23","unstructured":"Satyanarayana Murthy, T.: Privacy Preserving for Expertise Data using K-anonymity Technique to Advise the Farmers (2013)"},{"key":"19_CR24","unstructured":"Gopalan, N.P., Satyanarayana Murthy, T., Venkateswarlu, Y.: Hiding Critical Transaction using Unrealization approach (2017)"},{"key":"19_CR25","unstructured":"SatyanarayanaMurthy, T., Gopalan, N.P., Venkateswarlu, Y.: An Efficient Method for Hiding Association Rules with Additional Parameter Metrics (2017)"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1592-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T12:34:49Z","timestamp":1775306089000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1592-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,14]]},"ISBN":["9789811315916","9789811315923"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1592-3_19","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,14]]},"assertion":[{"value":"14 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}