{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T06:32:47Z","timestamp":1771914767046,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T00:00:00Z","timestamp":1517270400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10586-018-1827-6","type":"journal-article","created":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T05:17:20Z","timestamp":1517289440000},"page":"119-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Association rules and deep learning for cryptographic algorithm in privacy preserving data mining"],"prefix":"10.1007","volume":"22","author":[{"given":"N.","family":"Rajesh","sequence":"first","affiliation":[]},{"given":"A. Arul Lawrence","family":"Selvakumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,30]]},"reference":[{"key":"1827_CR1","doi-asserted-by":"crossref","unstructured":"Sharma, S. Agrawal, J., Agarwal, S., Sharma, S.: Machine learning techniques for data mining: a survey. In: Proceeding of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1\u201310 (2013)","DOI":"10.1109\/ICCIC.2013.6724149"},{"key":"1827_CR2","unstructured":"Shyu, F.-M., Cheng, P.-H., Su, M.-J., Luh, J.-J., Chen, H.-S., Chen, S.-J.: Context-based model for mobile electronic medical records. In: Proceedings of the IEEE Conference, pp. 1\u20138 (2006)"},{"key":"1827_CR3","unstructured":"McLatchey, J. , Barnett, G.O., McDonnell, G., Piggins, J., Zielstorff, R.D., Weidman-Dahl, F., Hoffer, E., Hupp, J.A.: The capturing of more detailed medical information in costar. In: Proceedings of the IEEE Conference, pp. 1\u20138 (1983)"},{"key":"1827_CR4","doi-asserted-by":"crossref","unstructured":"Pisanelli, D.M., Ricci, F.L.: Electronic medical records: the aggregation of single events for health care planning and quality assurance. In: Proceedings of the IEEE Conference, pp. 1\u20138 (1991)","DOI":"10.1109\/IEMBS.1992.594774"},{"key":"1827_CR5","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the Fifty-third Annual Allerton Conference, pp. 909\u2013910 (2015)","DOI":"10.1109\/ALLERTON.2015.7447103"},{"key":"1827_CR6","doi-asserted-by":"crossref","unstructured":"Tahamtan, A., Eder, J.: Privacy preservation through process views. In: Proceedings of the 24th International Conference on Advanced Information Networking and Applications Workshops, pp. 1100\u20131107 (2010)","DOI":"10.1109\/WAINA.2010.172"},{"key":"1827_CR7","unstructured":"Meng, F., Liu, B., Wang, C.: Privacy preserving clustering over distributed data. In: Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), pp. 544\u2013548 (2010)"},{"key":"1827_CR8","doi-asserted-by":"crossref","unstructured":"Nguyen, H.X., Roughan,M.: Multi-observer privacy-preserving hidden Markov models. In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS): Short Paper, pp. 514\u2013517 (2012)","DOI":"10.1109\/NOMS.2012.6211944"},{"key":"1827_CR9","first-page":"10562","volume":"5","author":"R Mendes","year":"2017","unstructured":"Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Translat. Content Min. 5, 10562\u201310582 (2017)","journal-title":"IEEE Translat. Content Min."},{"issue":"2","key":"1827_CR10","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/JSYST.2015.2402437","volume":"11","author":"C-M Yu","year":"2017","unstructured":"Yu, C.-M., Chen, C.-Y., Chao, H.-C.: Privacy-preserving multikeyword similarity search over outsourced cloud data. IEEE Syst. J. 11(2), 385\u2013393 (2017)","journal-title":"IEEE Syst. J."},{"key":"1827_CR11","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Fu, A.W.-C., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. In: Book\u2014Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques (2010)","DOI":"10.1201\/9781420091502"},{"issue":"3\/4","key":"1827_CR12","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1504\/IJAIP.2015.073717","volume":"7","author":"N Rajesh","year":"2015","unstructured":"Rajesh, N., Selvakumar, A.L.: Hiding personalised anonymity of attributes using privacy preserving data mining. Int. J. Adv. Intell. Paradig. 7(3\/4), 395\u2013396 (2015)","journal-title":"Int. J. Adv. Intell. Paradig."},{"issue":"9","key":"1827_CR13","first-page":"742","volume":"1","author":"M Mahendran","year":"2012","unstructured":"Mahendran, M.: An efficient algorithm for privacy preserving data mining using heuristic approach. Int. J. Adv. Res. Comput. Commun. Eng. 1(9), 742\u2013743 (2012)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"issue":"11","key":"1827_CR14","first-page":"893","volume":"3","author":"D Thakur","year":"2013","unstructured":"Thakur, D., Gupta, H.: An exemplary study of privacy preserving association rule mining techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(11), 893\u2013900 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"issue":"3","key":"1827_CR15","first-page":"219","volume":"2","author":"G Narang","year":"2013","unstructured":"Narang, G., Shaikh, A.: Preservation of privacy in mining using association rule technique. Int. J. Sci. Technol. Res. 2(3), 219\u2013220 (2013)","journal-title":"Int. J. Sci. Technol. Res."},{"issue":"01","key":"1827_CR16","first-page":"16","volume":"02","author":"D Verma","year":"2013","unstructured":"Verma, D., Jha, D.K.: Association rules hiding algorithm for privacy preserving data mining. Int. J. Comput. Sci. Emerg. Trends (IJCSET) 02(01), 16\u201320 (2013)","journal-title":"Int. J. Comput. Sci. Emerg. Trends (IJCSET)"},{"issue":"4","key":"1827_CR17","first-page":"207","volume":"5","author":"SK Chintada","year":"2013","unstructured":"Chintada, S.K., Madina, J.R.: A privacy preserving association rule mining over unrealized datasets. Int. J. Eng. Trends Technol. (IJETT) 5(4), 207\u2013210 (2013)","journal-title":"Int. J. Eng. Trends Technol. (IJETT)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-1827-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-1827-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-1827-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T14:37:15Z","timestamp":1565620635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-1827-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,30]]},"references-count":17,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["1827"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-1827-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,30]]},"assertion":[{"value":"31 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}