{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:54:58Z","timestamp":1760709298750,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T00:00:00Z","timestamp":1491955200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10489-017-0906-3","type":"journal-article","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T00:44:55Z","timestamp":1491957895000},"page":"544-557","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Optimizing association rule hiding using combination of border and heuristic approaches"],"prefix":"10.1007","volume":"47","author":[{"given":"Akbar","family":"Telikani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5195-1688","authenticated-orcid":false,"given":"Asadollah","family":"Shahbahrami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,12]]},"reference":[{"issue":"2","key":"906_CR1","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10618-005-0006-6","volume":"11","author":"E Bertino","year":"2005","unstructured":"Bertino E, Fovino IN, Provenza LP (2005) A framework for evaluating privacy preserving data mining algorithms. Data Mining Knowl Discov 11(2):121\u2013154","journal-title":"Data Mining Knowl Discov"},{"issue":"1","key":"906_CR2","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.dss.2006.08.007","volume":"43","author":"A Amiri","year":"2007","unstructured":"Amiri A (2007) Dare to share: Protecting sensitive knowledge with data sanitization. Decis Support Syst 43 (1):181\u2013191","journal-title":"Decis Support Syst"},{"key":"906_CR3","unstructured":"Sun X, Yu PS (2005) A border-based approach for hiding sensitive frequent itemsets. In: Proceedings of the 5th IEEE international conference on data mining, pp 426\u2013433"},{"key":"906_CR4","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.datak.2007.06.012","volume":"65","author":"GV Moustakides","year":"2008","unstructured":"Moustakides GV, Verykios VS (2008) A Max-Min approach for hiding frequent itemsets. Data Knowl Eng 65:75\u201389","journal-title":"Data Knowl Eng"},{"issue":"3","key":"906_CR5","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1287\/isre.1050.0056","volume":"16","author":"S Menon","year":"2005","unstructured":"Menon S, Sarkar S, Mukherjee S (2005) Maximizing accuracy of shared databases when concealing sensitive patterns. Inf Syst Res 16(3):256\u2013270","journal-title":"Inf Syst Res"},{"key":"906_CR6","unstructured":"Divanis AG, Verykios V (2006) An integer programming approach for frequent itemset hiding. In: Proceedings of the 15th ACM conference on information and knowledge management, pp 5\u2013 11"},{"key":"906_CR7","doi-asserted-by":"crossref","unstructured":"Lin CW, Hong TP, Wong JW, Lan GC, Lin WY (2014) A GA-based approach to hide sensitive high utility itemsets. Scientific World Journal","DOI":"10.1155\/2014\/804629"},{"key":"906_CR8","doi-asserted-by":"crossref","unstructured":"Lin C W, Zhang B, Yang KT, Hong TP (2014) Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Scientific World Journal","DOI":"10.1155\/2014\/398269"},{"issue":"2","key":"906_CR9","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/s10489-014-0590-5","volume":"42","author":"CW Lin","year":"2015","unstructured":"Lin C W, Hong T P, Yang K T, Wang S L (2015) The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl Intell 42(2):210\u2013230","journal-title":"Appl Intell"},{"key":"906_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.engappai.2016.03.007","volume":"53","author":"CW Lin","year":"2016","unstructured":"Lin C W, Liu Q, Fournier-Viger P, Hong T P, Voznak M, Zhan J (2016) A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng Appl Artif Intell 53:1\u201318","journal-title":"Eng Appl Artif Intell"},{"key":"906_CR11","doi-asserted-by":"crossref","unstructured":"Dasseni E, Verykios VS, Elmagarmid AK, Bertino E (2001) Hiding association rules by using confidence and support. In: Proceedings of the 4th information hiding workshop, pp 369\u2013383","DOI":"10.1007\/3-540-45496-9_27"},{"key":"906_CR12","unstructured":"Oliveira S R M, Zaiane O R (2002) Privacy preserving frequent itemset mining. In: Proceedings of the IEEE ICDM workshop on privacy, security and data mining 14, pp 43\u201354"},{"key":"906_CR13","doi-asserted-by":"crossref","unstructured":"Oliveira SRM, Zaiane OR (2003) Protecting sensitive knowledge by data sanitization. In: Proceedings of the 3rd IEEE international conference on data mining, pp 613\u2013616","DOI":"10.1109\/ICDM.2003.1250990"},{"key":"906_CR14","doi-asserted-by":"crossref","unstructured":"Oliveira SRM, Zaiane OR (2003) Algorithms for balancing privacy and knowledge discovery in association rule mining. In: Proceedings of the 7th international database engineering and applications symposium, pp 54\u201363","DOI":"10.1109\/IDEAS.2003.1214911"},{"key":"906_CR15","doi-asserted-by":"crossref","unstructured":"Pontikakis ED, Tsitsonis AA, Verykios VS (2004) An experimental study of distortion-based techniques for association rule hiding. In: Proceedings of the 18th conference on database security, pp 325\u2013339","DOI":"10.1007\/1-4020-8128-6_22"},{"key":"906_CR16","doi-asserted-by":"crossref","unstructured":"Wang SL, Jafari A (2005) Using unknowns for hiding sensitive predictive association rules. In: Proceedings of the international conference on information reuse and integration, pp 223\u2013228","DOI":"10.1109\/IRI-05.2005.1506477"},{"key":"906_CR17","doi-asserted-by":"crossref","first-page":"4006","DOI":"10.1016\/j.eswa.2008.02.050","volume":"36","author":"SL Wang","year":"2009","unstructured":"Wang S L (2009) Maintenance of sanitizing informative association rules. Expert Syst Appl 36:4006\u20134012","journal-title":"Expert Syst Appl"},{"issue":"2","key":"906_CR18","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.eswa.2006.05.022","volume":"33","author":"SL Wang","year":"2007","unstructured":"Wang S L, Parikh B, Jafari A (2007) Hiding informative association rule sets. Expert Syst Appl 33 (2):316\u2013323","journal-title":"Expert Syst Appl"},{"issue":"1-2","key":"906_CR19","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.eswa.2007.07.039","volume":"35","author":"SL Wang","year":"2008","unstructured":"Wang S L, Maskey R, Jafari A, Hong T P (2008) Efficient sanitization of informative association rules. Expert Syst Appl 35(1-2):442\u2013450","journal-title":"Expert Syst Appl"},{"issue":"1","key":"906_CR20","first-page":"66","volume":"26","author":"SL Wang","year":"2007","unstructured":"Wang S L, Patel D, Jafari A, Hong T P (2007) Hiding collaborative recommendation association rules. Appl Intell 26(1):66\u201377","journal-title":"Appl Intell"},{"key":"906_CR21","unstructured":"Hai LQ, Somjit A (2012) A conceptual framework for privacy preserving of association rule mining in e-commerce.In: Proceedings of the 7th conference on industrial electronics and applications, pp 1999\u20132003"},{"key":"906_CR22","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1016\/j.compind.2013.04.011","volume":"64","author":"LQ Hai","year":"2013","unstructured":"Hai L Q, Somjit A, Huy X N, Ngamnij A (2013) Association rule hiding in risk management for retail supply chain collaboration. Comput Indust 64:776\u2013784","journal-title":"Comput Indust"},{"key":"906_CR23","unstructured":"Hai LQ, Somjit A, Ngamnij A (2012) Association rule hiding based on distance and intersection lattice. In: Proceedings of the 4th international conference on computer technology and development, pp 227\u2013231"},{"key":"906_CR24","doi-asserted-by":"crossref","unstructured":"Hai L Q, Somjit A, Ngamnij A (2013) Association rule hiding based on intersection lattice. Mathematical Problems in Engineering","DOI":"10.1155\/2013\/210405"},{"key":"906_CR25","doi-asserted-by":"crossref","unstructured":"Agrawal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. In: Proceedings of the conference on management of data, pp 207\u2013216","DOI":"10.1145\/170035.170072"},{"key":"906_CR26","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.knosys.2015.12.019","volume":"96","author":"CW Lin","year":"2016","unstructured":"Lin C W, Gan W, Fournier-Viger P, Hong T P, Tseng V S (2016) Efficient algorithms for mining high-utility itemsets in uncertain databases. Knowl-Based Syst 96:171\u2013187","journal-title":"Knowl-Based Syst"},{"key":"906_CR27","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-0-387-70992-5_11","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms","author":"VS Verykios","year":"2008","unstructured":"Verykios V S, Divanis A G (2008) A survey of association rule hiding methods for privacy. In: Aggarwal C, Yu P S (eds) Privacy-Preserving Data Mining: Models and Algorithms. Springer, New York, pp 267\u2013289"},{"key":"906_CR28","unstructured":"Agrawal R, Srikant R (1994) Fast algorithms for mining association rules. In: Proceedings of the20th international conference on very large databases, pp 487\u2013499"},{"key":"906_CR29","doi-asserted-by":"crossref","unstructured":"Han J, Pei J, Yin Y (2000) Mining frequent pattern without candidate generation. In: Proceedings of the international conference on Management of Data, pp 1\u201312","DOI":"10.1145\/342009.335372"},{"key":"906_CR30","unstructured":"Zaki M, Parthasarathy S, Ogihara M, Li W (1997) New algorithms for fast discovery of association rules. The international conference Knowledge Discovery and Data Mining, pp 283\u2013 286"},{"key":"906_CR31","doi-asserted-by":"crossref","unstructured":"Li J, Choudhary A, Jiang N, Liao W-K (2006) Mining frequent patterns by differential refinement of clustered bitmaps. In: Proceedings of the international conference on data mining, pp 294\u2013 305","DOI":"10.1137\/1.9781611972764.26"},{"key":"906_CR32","unstructured":"Telikani A, Shahbahrami A, Tavoli R (2015) Data sanitization in association rule mining based-on impact factor. Artificial Intelligence and Data Mining, pp 131\u2013140"},{"key":"906_CR33","unstructured":"Atallah M, Bertino E, Elmagarmid A K, Ibrahim M, Verykios VS (1999) Disclosure limitation of sensitive rules. In: Proceedings of the IEEE knowledge and data engineering exchange workshop"},{"key":"906_CR34","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.aei.2006.12.003","volume":"21","author":"YC Li","year":"2007","unstructured":"Li Y C, Yeh J S, Chang C C (2007) MICF: an effective sanitization algorithm for hiding sensitive patterns on data mining. Adv Eng Inf 21:269\u2013280","journal-title":"Adv Eng Inf"},{"key":"906_CR35","doi-asserted-by":"crossref","unstructured":"Gr\u00e4tzer G (2011) Lattice theory: foundation. Springer, 3rd Edition","DOI":"10.1007\/978-3-0348-0018-1"},{"key":"906_CR36","doi-asserted-by":"crossref","unstructured":"Huang H, Wu X, Relue R (2002) Association analysis with one scan of databases. In: Proceedings of the IEEE international conference on data mining, pp 629\u2013632","DOI":"10.1109\/ICDM.2002.1184015"},{"issue":"1","key":"906_CR37","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/1007730.1007744","volume":"6","author":"B Goethals","year":"2004","unstructured":"Goethals B, Zaki M (2004) Advances in frequent itemset mining implementations: Report on FIMI. SIGKDD Explor 6(1):109\u2013117","journal-title":"SIGKDD Explor"},{"key":"906_CR38","doi-asserted-by":"crossref","unstructured":"Bayardo R (1998) Efficiently mining long patterns from databases. In: Proceedings of the conference on management of data, pp 85\u201393","DOI":"10.1145\/276304.276313"},{"issue":"2","key":"906_CR39","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/380995.381033","volume":"2","author":"R Kohavi","year":"2000","unstructured":"Kohavi R, Brodley C, Frasca L, Mason L, Zheng Z (2000) KDDCup 2000 organizers\u2019 report: Peeling the onion. SIGKDD Explor 2(2):86\u201398","journal-title":"SIGKDD Explor"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-017-0906-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-0906-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-0906-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T19:28:23Z","timestamp":1569007703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-017-0906-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,12]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["906"],"URL":"https:\/\/doi.org\/10.1007\/s10489-017-0906-3","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2017,4,12]]}}}