{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T12:18:44Z","timestamp":1759666724601,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T00:00:00Z","timestamp":1623801600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T00:00:00Z","timestamp":1623801600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10489-021-02490-4","type":"journal-article","created":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T11:02:41Z","timestamp":1623841361000},"page":"2539-2555","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Frequent itemset hiding revisited: pushing hiding constraints into mining"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9758-0819","authenticated-orcid":false,"given":"Vassilios S.","family":"Verykios","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0706-781X","authenticated-orcid":false,"given":"Elias C.","family":"Stavropoulos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Panteleimon","family":"Krasadakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6852-384X","authenticated-orcid":false,"given":"Evangelos","family":"Sakkopoulos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,6,16]]},"reference":[{"key":"2490_CR1","doi-asserted-by":"crossref","unstructured":"Abul O, Atzori M, Bonchi F, Giannotti F (2007) Hiding sequences. In: SEBD, pp 233\u2013241","DOI":"10.1109\/ICDEW.2007.4400985"},{"key":"2490_CR2","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.datak.2011.10.002","volume":"72","author":"O Abul","year":"2012","unstructured":"Abul O, G\u00f6k\u00e7e H (2012) Knowledge hiding from tree and graph databases. Data Knowl Eng 72:148\u2013171","journal-title":"Data Knowl Eng"},{"key":"2490_CR3","unstructured":"Agrawal R, Srikant R (1994) Fast algorithms for mining association rules in large databases. In: VLDB, pp 487\u2013 499"},{"key":"2490_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: SIGMOD conference, pp 439\u2013450","DOI":"10.1145\/335191.335438"},{"key":"2490_CR5","doi-asserted-by":"crossref","unstructured":"Amiri F, Quirchmayr G (2017) A comparative study on innovative approaches for privacy-preservation in knowledge discovery. In: ICIME 2017: Proceedings of the 9th international conference on information management and engineering, pp 120\u2013 127","DOI":"10.1145\/3149572.3149586"},{"key":"2490_CR6","unstructured":"Atallah M, Bertino E, Elmagarmid A, Ibrahim M, Verykios V (1999) Disclosure limitation of sensitive rules. In: KDEX workshop. IEEE, pp 45\u201352"},{"key":"2490_CR7","volume-title":"Privacy-aware knowledge discovery: novel applications and new techniques. Chapman & hall\/CRC data mining and knowledge discovery series","author":"F Bonchi","year":"2011","unstructured":"Bonchi F, Ferrari E (2011) Privacy-aware knowledge discovery: novel applications and new techniques. Chapman & hall\/CRC data mining and knowledge discovery series. CRC Press Inc., Boca Raton"},{"issue":"2","key":"2490_CR8","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/s10115-005-0201-1","volume":"9","author":"F Bonchi","year":"2006","unstructured":"Bonchi F, Lucchese C (2006) On condensed representations of constrained frequent patterns. Knowl Inf Syst 9(2):180\u2013201","journal-title":"Knowl Inf Syst"},{"key":"2490_CR9","doi-asserted-by":"crossref","unstructured":"Bonchi F, Saygin Y, Verykios VS, Atzori M, Gkoulalas-Divanis A, Kaya SV, Savas E (2008) Privacy in spatiotemporal data mining. In: Mobility, data mining and privacy, pp 297\u2013 333","DOI":"10.1007\/978-3-540-75177-9_12"},{"key":"2490_CR10","doi-asserted-by":"crossref","unstructured":"Boulicaut J-F, Jeudy B (2005) Constraint-based data mining. In: The data mining and knowledge discovery handbook, pp 399\u2013416","DOI":"10.1007\/0-387-25465-X_18"},{"key":"2490_CR11","doi-asserted-by":"crossref","unstructured":"Bu S, Lakshmanan LVS, Ng RT, Ramesh G (2007) Preservation of patterns and input-output privacy. In: ICDE, pp 696\u2013 705","DOI":"10.1109\/ICDE.2007.367915"},{"issue":"1-2","key":"2490_CR12","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.tcs.2007.11.003","volume":"394","author":"T Calders","year":"2008","unstructured":"Calders T (2008) Itemset frequency satisfiability: Complexity and axiomatization. Theor Comput Sci 394(1-2):84\u2013111","journal-title":"Theor Comput Sci"},{"key":"2490_CR13","first-page":"205034","volume-title":"GDPR compliant information confidentiality preservation in big data processing","author":"L Caruccio","year":"2020","unstructured":"Caruccio L, Desiato D, Polese G, Tortora G (2020) GDPR compliant information confidentiality preservation in big data processing. IEEE Access, NJ, pp 205034\u2013205050"},{"key":"2490_CR14","doi-asserted-by":"crossref","first-page":"2603","DOI":"10.1007\/s10462-018-9629-z","volume":"52","author":"CH Chee","year":"2019","unstructured":"Chee CH, Jaafar J, Aziz IA, Hasan MH, Yeoh W (2019) Algorithms for frequent itemset mining: a literature review. Artif Intell 52:2603\u20132621","journal-title":"Artif Intell"},{"key":"2490_CR15","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s10489-015-0671-0","volume":"44","author":"P Cheng","year":"2016","unstructured":"Cheng P, Roddick JF, Chu SC, Lin CW (2016) Privacy preservation through a greedy, distortion-based rule-hiding method. Appl Intell 44:295\u2013306","journal-title":"Appl Intell"},{"key":"2490_CR16","doi-asserted-by":"crossref","unstructured":"Clifton C (1999) Protecting against data mining through samples. In: DBSEc, pp 193\u2013207","DOI":"10.1007\/978-0-387-35508-5_13"},{"key":"2490_CR17","doi-asserted-by":"crossref","unstructured":"Dasseni E, Verykios VS, Elmagarmid AK, Bertino E (2001) Hiding association rules by using confidence and support. In: Information hiding, pp 369\u2013383","DOI":"10.1007\/3-540-45496-9_27"},{"key":"2490_CR18","doi-asserted-by":"crossref","unstructured":"Delis A, Verykios VS, Tsitsonis AA (2010) A data perturbation approach to sensitive classification rule hiding. In: SAC, pp 605\u2013609","DOI":"10.1145\/1774088.1774216"},{"key":"2490_CR19","doi-asserted-by":"publisher","first-page":"4775","DOI":"10.1007\/s10489-018-1245-8","volume":"48","author":"Y Djenouri","year":"2018","unstructured":"Djenouri Y, Djenouri D, Belhadi A, Fournier-Viger P, Lin JCW (2018) A new framework for metaheuristic-based frequent itemset mining. Appl Intell 48:4775\u20134791","journal-title":"Appl Intell"},{"key":"2490_CR20","doi-asserted-by":"crossref","unstructured":"Feretzakis G, Mitropoulos K, Kalles D, Verykios VS (2020) Local distortion hiding (LDH) algorithm: a Java-based prototype. In: SETN, pp 144\u2013149","DOI":"10.1145\/3411408.3411419"},{"issue":"1","key":"2490_CR21","doi-asserted-by":"publisher","first-page":"66","DOI":"10.3390\/e21010066","volume":"21","author":"G Feretzakis","year":"2019","unstructured":"Feretzakis G, Kalles D, Verykios VS (2019) On using linear diophantine equations for in-parallel hiding of decision tree rules. Entropy 21(1):66","journal-title":"Entropy"},{"key":"2490_CR22","unstructured":"Efficient Apriori : https:\/\/github.com\/tommyod\/Efficient-Apriori"},{"issue":"4","key":"2490_CR23","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.is.2003.09.001","volume":"29","author":"AV Evfimievski","year":"2004","unstructured":"Evfimievski AV, Srikant R, Agrawal R, Gehrke J (2004) Privacy preserving mining of association rules. Inf Syst 29(4):343\u2013364","journal-title":"Inf Syst"},{"key":"2490_CR24","unstructured":"Frequent itemset mining dataset repository: http:\/\/fimi.uantwerpen.be\/data\/"},{"key":"2490_CR25","doi-asserted-by":"crossref","unstructured":"Gao F, Khandelwal A, Liu J (2019) Mining frequent itemsets using improved apriori on spark. ICISDM 2019","DOI":"10.1145\/3325917.3325925"},{"key":"2490_CR26","doi-asserted-by":"crossref","unstructured":"Gkoulalas-Divanis A, Verykios VS (2006) An integer programming approach for frequent itemset hiding. In: CIKM, pp 748\u2013 757","DOI":"10.1145\/1183614.1183721"},{"issue":"5","key":"2490_CR27","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TKDE.2008.199","volume":"21","author":"A Gkoulalas-Divanis","year":"2009","unstructured":"Gkoulalas-Divanis A, Verykios VS (2009) Exact knowledge hiding through database extension. IEEE Trans Knowl Data Eng 21(5):699\u2013713","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"2490_CR28","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s10115-008-0178-7","volume":"20","author":"A Gkoulalas-Divanis","year":"2009","unstructured":"Gkoulalas-Divanis A, Verykios VS (2009) Hiding sensitive knowledge without side effects. Knowl Inf Syst 20(3):263\u2013299","journal-title":"Knowl Inf Syst"},{"issue":"9","key":"2490_CR29","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","volume":"16","author":"M Kantarcioglu","year":"2004","unstructured":"Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng 16(9):1026\u20131037","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2490_CR30","doi-asserted-by":"crossref","unstructured":"Kenthapadi K, Mironov I, Thakurta AG (2019) Privacy-preserving data mining in industry. In: Twelfth ACM international conference","DOI":"10.1145\/3289600.3291384"},{"key":"2490_CR31","unstructured":"Leloglu E, Ayav T, Ergenc B (2014) Coefficient-based exact approach for frequent itemset hiding. In: eKNOW2014: the 6th international conference on information, process, and knowledge management, pp 124\u2013130"},{"key":"2490_CR32","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.cose.2019.03.008","volume":"84","author":"R Li","year":"2019","unstructured":"Li R, Mu N, Le J, Liao X (2019) Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction. Comput Sec (elsevier) 84:17\u201334","journal-title":"Comput Sec (elsevier)"},{"key":"2490_CR33","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10489-019-01524-2","volume":"50","author":"X Liu","year":"2020","unstructured":"Liu X, Wen S, Zuo W (2020) Effective sanitization approaches to protect sensitive knowledge in high-utility itemset mining. Appl Intell 50:169\u2013191","journal-title":"Appl Intell"},{"key":"2490_CR34","doi-asserted-by":"crossref","unstructured":"Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: CRYPTO, pp 36\u201354","DOI":"10.1007\/3-540-44598-6_3"},{"key":"2490_CR35","first-page":"1","volume":"11","author":"C Makris","year":"2018","unstructured":"Makris C, Markovits P (2018) Evaluation of sensitive data hiding techniques for transaction databases. SETN \u201918 11:1\u20138","journal-title":"SETN \u201918"},{"issue":"3","key":"2490_CR36","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1287\/isre.1050.0056","volume":"16","author":"S Menon","year":"2005","unstructured":"Menon S, Sarkar S, Mukherjee S (2005) Maximizing accuracy of shared databases when concealing sensitive patterns. Inf Syst Res 16(3):256\u2013270","journal-title":"Inf Syst Res"},{"issue":"1","key":"2490_CR37","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.datak.2007.06.012","volume":"65","author":"GV Moustakides","year":"2008","unstructured":"Moustakides GV, Verykios VS (2008) A maxmin approach for hiding frequent itemsets. Data Knowl Eng 65(1):75\u2013 89","journal-title":"Data Knowl Eng"},{"key":"2490_CR38","doi-asserted-by":"crossref","unstructured":"Oliveira SRM, Za\u00efane OR (2003) Protecting sensitive knowledge by data sanitization. In: ICDM, pp 613\u2013616","DOI":"10.1109\/ICDM.2003.1250990"},{"key":"2490_CR39","doi-asserted-by":"crossref","unstructured":"Ozturk AC, Bostanoglu EB (2017) Itemset hiding under multiple sensitive support thresholds. In: Proceedings of 9th international joint conference on knowledge discovery knowledge engineering and knowledge management, pp 222\u2013231","DOI":"10.5220\/0006501502220231"},{"key":"2490_CR40","unstructured":"Python Pulp Library: https:\/\/pythonhosted.org\/PuLP\/"},{"key":"2490_CR41","doi-asserted-by":"crossref","unstructured":"Rizvi S, Haritsa JR (2002) Maintaining data privacy in association rule mining. In: VLDB, pp 682\u2013693","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"2490_CR42","doi-asserted-by":"crossref","unstructured":"Sharma S, Toshniwal D (2020) MR-OVNTSA: a heuristics based sensitive pattern hiding approach for big data. Appl Intell","DOI":"10.1007\/s10489-020-01749-6"},{"key":"2490_CR43","doi-asserted-by":"crossref","unstructured":"Md Siraj M, Rahmat NA, Din MM (2019) A survey on privacy preserving data mining approaches and techniques. In: ICSCA \u201919: proceedings of the 2019 8th international conference on software and computer applications, pp 65\u201369","DOI":"10.1145\/3316615.3316632"},{"key":"2490_CR44","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1007\/s10618-019-00643-1","volume":"33","author":"D Sacca","year":"2019","unstructured":"Sacca D, Serra E, Rullo A (2019) Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications. Data Mining Knowl Discov 33:1736\u20131774","journal-title":"Data Mining Knowl Discov"},{"key":"2490_CR45","unstructured":"Srikant R, Vu Q, Agrawal R (1997) Mining association rules with item constraints. In: KDD, pp 67\u201373"},{"key":"2490_CR46","doi-asserted-by":"crossref","unstructured":"Stavropoulos EC, Verykios VS, Kagklis V (2016) A transversal hypergraph approach for the frequent itemset hiding problem. Knowl Inf Sys","DOI":"10.1007\/s10115-015-0862-3"},{"key":"2490_CR47","unstructured":"Sun X, Yu PS (2005) A border-based approach for hiding sensitive frequent itemsets. In: ICDM, pp 426\u2013433"},{"issue":"1","key":"2490_CR48","doi-asserted-by":"publisher","first-page":"74","DOI":"10.5626\/JCSE.2007.1.1.074","volume":"1","author":"X Sun","year":"2007","unstructured":"Sun X, Yu PS (2007) Hiding sensitive frequent itemsets by a border-based approach. JCSE 1(1):74\u201394","journal-title":"JCSE"},{"key":"2490_CR49","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.eswa.2017.10.048","volume":"96","author":"A Telikani","year":"2018","unstructured":"Telikani A, Shahbahrami A (2018) Data sanitization in association rule mining: an analytical review. Expert Sys Appl 96:406\u2013 426","journal-title":"Expert Sys Appl"},{"issue":"2","key":"2490_CR50","first-page":"132","volume":"3","author":"A Telikani","year":"2015","unstructured":"Telikani A, Shahbahrami A, Tavoli R (2015) Data sanitization in association rule mining based on impact factor. J AI Data Min 3(2):132\u2013140","journal-title":"J AI Data Min"},{"issue":"4","key":"2490_CR51","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"VS Verykios","year":"2004","unstructured":"Verykios VS, Elmagarmid AK, Bertino E, Saygin Y, Dasseni E (2004) Association rule hiding. IEEE Trans Knowl Data Eng 16(4):434\u2013447","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2490_CR52","doi-asserted-by":"crossref","unstructured":"Verykios VS, Stavropoulos EC, Zorkadis V, Elmagarmid AK (2019) A constraint-based model for the frequent itemset hiding problem. e-Democracy 49\u201364","DOI":"10.1007\/978-3-030-37545-4_4"},{"key":"2490_CR53","doi-asserted-by":"crossref","unstructured":"Voigt P, von dem Bussche A (2017) The EU general data protection regulation(GDPR): a practical guide in Springer","DOI":"10.1007\/978-3-319-57959-7"},{"key":"2490_CR54","doi-asserted-by":"crossref","unstructured":"Wen H, Kou M, He H, Li X, Tou H, Yang Y. (2018) A spark-based incremental algorithm for frequent itemset mining. In: BDIOT 2018: proceedings of the 2018 2nd international conference on big data and internet of things, pp 53\u201358","DOI":"10.1145\/3289430.3289445"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02490-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02490-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02490-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T09:27:48Z","timestamp":1672478868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02490-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,16]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["2490"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02490-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2021,6,16]]},"assertion":[{"value":"29 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}