{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:35:46Z","timestamp":1775882146420,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"S2","license":[{"start":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T00:00:00Z","timestamp":1515715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Union Innovation Research Foundation of Jiangsu province","award":["BY2014033"],"award-info":[{"award-number":["BY2014033"]}]},{"name":"Science and technology plan fund of Xuzhou","award":["XM13B021"],"award-info":[{"award-number":["XM13B021"]}]},{"name":"the key technology of major accident prevention of national security production fund","award":["Jiangsu-0006-2016AQ"],"award-info":[{"award-number":["Jiangsu-0006-2016AQ"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10586-017-1691-9","type":"journal-article","created":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T06:21:35Z","timestamp":1515738095000},"page":"2907-2919","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A differential privacy DNA motif finding method based on closed frequent patterns"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-9781","authenticated-orcid":false,"given":"Xiang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yuyang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yaqing","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,12]]},"reference":[{"key":"1691_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Mining sequential patterns. In: icde, p. 3 (1995)","DOI":"10.1109\/ICDE.1995.380415"},{"issue":"21","key":"1691_CR2","doi-asserted-by":"crossref","first-page":"7882","DOI":"10.1016\/j.eswa.2015.06.021","volume":"42","author":"K Amphawan","year":"2015","unstructured":"Amphawan, K., Lenca, P.: Mining top-k frequent-regular closed patterns. Expert Syst. Appl. 42(21), 7882\u20137894 (2015)","journal-title":"Expert Syst. Appl."},{"key":"1691_CR3","doi-asserted-by":"crossref","unstructured":"Bhaskar, R., Laxman, S., Smith, A., Thakurta, A.: Discovering frequent patterns in sensitive data. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 503\u2013512. ACM (2010)","DOI":"10.1145\/1835804.1835869"},{"issue":"2","key":"1691_CR4","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1089\/10665270252935421","volume":"9","author":"M Blanchette","year":"2002","unstructured":"Blanchette, M., Schwikowski, B., Tompa, M.: Algorithms for phylogenetic footprinting. J. Comput. Biol. 9(2), 211\u2013223 (2002)","journal-title":"J. Comput. Biol."},{"key":"1691_CR5","doi-asserted-by":"crossref","unstructured":"Chen, R., Acs, G., Castelluccia, C.: Differentially private sequential data publication via variable-length n-grams. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 638\u2013649. ACM (2012a)","DOI":"10.1145\/2382196.2382263"},{"key":"1691_CR6","doi-asserted-by":"crossref","unstructured":"Chen, R., Fung, B., Desai, B.C., Sossou, N.M.: Differentially private transit data publication: a case study on the montreal transportation system. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 213\u2013221. ACM (2012b)","DOI":"10.1145\/2339530.2339564"},{"key":"1691_CR7","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.jbi.2013.12.016","volume":"50","author":"R Chen","year":"2014","unstructured":"Chen, R., Peng, Y., Choi, B., Xu, J., Hu, H.: A private dna motif finding algorithm. J. Biomed. Inf. 50, 122\u2013132 (2014)","journal-title":"J. Biomed. Inf."},{"issue":"3\u20134","key":"1691_CR8","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Foundations and trends $${\\textregistered }$$ \u00ae . Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Theor. Comput. Sci."},{"key":"1691_CR9","doi-asserted-by":"crossref","unstructured":"Geng, Q., Viswanath, P.: The optimal mechanism in differential privacy. In: 2014 IEEE International Symposium on Information Theory (ISIT), pp. 2371\u20132375. IEEE (2014)","DOI":"10.1109\/ISIT.2014.6875258"},{"issue":"2","key":"1691_CR10","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1109\/TIT.2015.2504972","volume":"62","author":"Q Geng","year":"2016","unstructured":"Geng, Q., Viswanath, P.: Optimal noise adding mechanisms for approximate differential privacy. IEEE Trans. Inf. Theory 62(2), 952\u2013969 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"12","key":"1691_CR11","first-page":"2789","volume":"52","author":"L Guo-Qing","year":"2015","unstructured":"Guo-Qing, L., Xiao-Jian, Z., Li-Ping, D., Yan-Feng, L., Xin, L.: Frequent sequential pattern mining under differential privacy. J. Comput. Res. Dev. 52(12), 2789\u20132801 (2015)","journal-title":"J. Comput. Res. Dev."},{"issue":"6117","key":"1691_CR12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek, M., McGuire, A.L., Golan, D., Halperin, E., Erlich, Y.: Identifying personal genomes by surname inference. Science 339(6117), 321\u2013324 (2013)","journal-title":"Science"},{"key":"1691_CR13","unstructured":"Han, J., Pei, J., Mortazavi-Asl, B., Pinto, H., Chen, Q., Dayal, U., Hsu, M.: Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth. In: proceedings of the 17th International Conference on Data Engineering, pp. 215\u2013224 (2001)"},{"issue":"1\u20132","key":"1691_CR14","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M Hay","year":"2010","unstructured":"Hay, M., Rastogi, V., Miklau, G., Suciu, D.: Boosting the accuracy of differentially private histograms through consistency. Proc.VLDB Endow. 3(1\u20132), 1021\u20131032 (2010)","journal-title":"Proc.VLDB Endow."},{"key":"1691_CR15","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/j.ins.2015.01.021","volume":"305","author":"N Holohan","year":"2015","unstructured":"Holohan, N., Leith, D.J., Mason, O.: Differential privacy in metric spaces: numerical, categorical and functional data under the one roof. Inf. Sci. 305, 256\u2013268 (2015)","journal-title":"Inf. Sci."},{"issue":"8","key":"1691_CR16","doi-asserted-by":"crossref","first-page":"167e1000","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer, N., Szelinger, S., Redman, M., Duggan, D., Tembe, W., Muehling, J., Pearson, J.V., Stephan, D.A., Nelson, S.F., Craig, D.W.: Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet. 4(8), 167e1000 (2008)","journal-title":"PLoS Genet."},{"key":"1691_CR17","doi-asserted-by":"crossref","unstructured":"Johnson, A., Shmatikov, V.: Privacy-preserving data exploration in genome-wide association studies. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1079\u20131087. ACM (2013)","DOI":"10.1145\/2487575.2487687"},{"issue":"22","key":"1691_CR18","doi-asserted-by":"crossref","first-page":"4633","DOI":"10.1093\/nar\/29.22.4633","volume":"29","author":"S Kurtz","year":"2001","unstructured":"Kurtz, S., Choudhuri, J.V., Ohlebusch, E., Schleiermacher, C., Stoye, J., Giegerich, R.: Reputer: the manifold applications of repeat analysis on a genomic scale. Nucleic Acids Res. 29(22), 4633\u20134642 (2001)","journal-title":"Nucleic Acids Res."},{"issue":"19","key":"1691_CR19","doi-asserted-by":"crossref","first-page":"6648","DOI":"10.1016\/j.eswa.2015.04.048","volume":"42","author":"T Le","year":"2015","unstructured":"Le, T., Vo, B.: An n-list-based algorithm for mining frequent closed patterns. Expert Syst. Appl. 42(19), 6648\u20136657 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"11","key":"1691_CR20","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.14778\/2350229.2350251","volume":"5","author":"N Li","year":"2012","unstructured":"Li, N., Qardaji, W., Dong, S., Cao, J.: Privbasis: frequent itemset mining with differential privacy. Proc. Vldb Endow. 5(11), 1340\u20131351 (2012)","journal-title":"Proc. Vldb Endow."},{"issue":"5","key":"1691_CR21","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1055\/s-0038-1634025","volume":"44","author":"BA Malin","year":"2005","unstructured":"Malin, B.A.: Protecting genomic sequence anonymity with generalization lattices. Methods Inf. Med. 44(5), 687 (2005)","journal-title":"Methods Inf. Med."},{"issue":"5","key":"1691_CR22","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1093\/bib\/bbp032","volume":"10","author":"J Mrzek","year":"2009","unstructured":"Mrzek, J.: Finding sequence motifs in prokaryotic genomes-a brief practical guide for a microbiologist. Brief. Bioinf. 10(5), 525 (2009)","journal-title":"Brief. Bioinf."},{"issue":"1","key":"1691_CR23","doi-asserted-by":"crossref","first-page":"S207","DOI":"10.1093\/bioinformatics\/17.suppl_1.S207","volume":"17","author":"G Pavesi","year":"2001","unstructured":"Pavesi, G., Mauri, G., Pesole, G.: An algorithm for finding signals of unknown length in DNA sequences. Bioinformatics 17(1), S207\u2013S214 (2001)","journal-title":"Bioinformatics"},{"issue":"03","key":"1691_CR24","doi-asserted-by":"crossref","first-page":"1250011","DOI":"10.1142\/S021821301250011X","volume":"21","author":"M Qiao","year":"2012","unstructured":"Qiao, M., Zhang, D.: Efficiently matching frequent patterns based on bitmap inverted files built from closed itemsets. Int. J. Artif. Intell. Tools 21(03), 1250011 (2012)","journal-title":"Int. J. Artif. Intell. Tools"},{"key":"1691_CR25","doi-asserted-by":"crossref","unstructured":"Ren, J.D., Yang, J., Li, Y.: Mining weighted closed sequential patterns in large databases. In: Proceedings of 2008. FSKD\u201908. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 5, pp. 640\u2013644. IEEE (2008)","DOI":"10.1109\/FSKD.2008.97"},{"issue":"9","key":"1691_CR26","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1093\/bioinformatics\/btw009","volume":"32","author":"S Simmons","year":"2016","unstructured":"Simmons, S., Berger, B.: Realizing privacy preserving genome-wide association studies. Bioinformatics 32(9), 1293\u20131300 (2016)","journal-title":"Bioinformatics"},{"issue":"1","key":"1691_CR27","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.cels.2016.04.013","volume":"3","author":"S Simmons","year":"2016","unstructured":"Simmons, S., Sahinalp, C., Berger, B.: Enabling privacy-preserving gwass in heterogeneous human populations. Cell Syst. 3(1), 54\u201361 (2016)","journal-title":"Cell Syst."},{"issue":"4","key":"1691_CR28","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1093\/bioinformatics\/5.4.293","volume":"5","author":"R Staden","year":"1989","unstructured":"Staden, R.: Methods for discovering novel motifs in nucleic acid sequences. Bioinformatics 5(4), 293\u2013298 (1989)","journal-title":"Bioinformatics"},{"issue":"7","key":"1691_CR29","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1109\/TKDE.2015.2399310","volume":"27","author":"S Su","year":"2015","unstructured":"Su, S., Xu, S., Cheng, X., Li, Z., Yang, F.: Differentially private frequent itemset mining via transaction splitting. IEEE Trans. Knowl. Data Eng. 27(7), 1875\u20131891 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"1691_CR30","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1038\/nbt1053","volume":"23","author":"M Tompa","year":"2005","unstructured":"Tompa, M., Li, N., Bailey, T.L., Church, G.M., De, M.B., Eskin, E., Favorov, A.V., Frith, M.C., Fu, Y., Kent, W.J.: Assessing computational tools for the discovery of transcription factor binding sites. Nat. Biotechnol. 23(1), 137 (2005)","journal-title":"Nat. Biotechnol."},{"key":"1691_CR31","doi-asserted-by":"crossref","unstructured":"Tram\u00e8r, F., Huang, Z., Hubaux, J.P., Ayday, E.: Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1286\u20131297. ACM (2015)","DOI":"10.1145\/2810103.2813610"},{"issue":"1","key":"1691_CR32","first-page":"137","volume":"5","author":"C Uhlerop","year":"2013","unstructured":"Uhlerop, C., Slavkovi\u0107, A., Fienberg, S.E.: Privacy-preserving data sharing for genome-wide association studies. J. Privacy Confid. 5(1), 137 (2013)","journal-title":"J. Privacy Confid."},{"key":"1691_CR33","doi-asserted-by":"crossref","unstructured":"Yan, X., Han, J., Afshar, R.: Clospan: Mining: Closed sequential patterns in large datasets. In: Proceedings of the 2003 SIAM International Conference on Data Mining, pp. 166\u2013177. SIAM (2003)","DOI":"10.1137\/1.9781611972733.15"},{"key":"1691_CR34","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.jbi.2014.01.008","volume":"50","author":"F Yu","year":"2014","unstructured":"Yu, F., Fienberg, S.E., Slavkovi\u0107, A.B., Uhler, C.: Scalable privacy-preserving data sharing methodology for genome-wide association studies. J. Biomed. Inf. 50, 133\u2013141 (2014a)","journal-title":"J. Biomed. Inf."},{"key":"1691_CR35","doi-asserted-by":"crossref","unstructured":"Yu, F., Rybar, M., Uhler, C., Fienberg, S.E.: Differentially-private logistic regression for detecting multiple-SNP association in GWAS databases. In: International Conference on Privacy in Statistical Databases, pp. 170\u2013184. Springer (2014b)","DOI":"10.1007\/978-3-319-11257-2_14"},{"issue":"1","key":"1691_CR36","first-page":"25","volume":"6","author":"C Zeng","year":"2012","unstructured":"Zeng, C., Naughton, J.F., Cai, J.Y.: On differentially private frequent itemset mining. Vldb J. 6(1), 25\u201336 (2012)","journal-title":"Vldb J."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1691-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1691-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1691-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T20:15:06Z","timestamp":1751228106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1691-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,12]]},"references-count":36,"journal-issue":{"issue":"S2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["1691"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1691-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,12]]},"assertion":[{"value":"22 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}