{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T02:10:40Z","timestamp":1778033440302,"version":"3.51.4"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11277-024-11342-6","type":"journal-article","created":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T12:01:47Z","timestamp":1719316907000},"page":"1261-1281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Securing Sensitive Medical Information with Basic and Pre-large Coati Optimization Algorithm for E-Health System Data Sanitation"],"prefix":"10.1007","volume":"136","author":[{"given":"M.","family":"Madhavi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T.","family":"Sasirooba","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G. Kranthi","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,6,25]]},"reference":[{"issue":"4","key":"11342_CR1","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1007\/s00530-020-00736-8","volume":"28","author":"A Rehman","year":"2022","unstructured":"Rehman, A., Naz, S., & Razzak, I. (2022). Leveraging big data analytics in healthcare enhancement: Trends, challenges and opportunities. Multimedia Systems, 28(4), 1339\u20131371.","journal-title":"Multimedia Systems"},{"issue":"5","key":"11342_CR2","doi-asserted-by":"publisher","first-page":"102285","DOI":"10.1016\/j.telpol.2021.102285","volume":"46","author":"JS Winter","year":"2022","unstructured":"Winter, J. S., & Davidson, E. (2022). Harmonizing regulatory regimes for the governance of patient-generated health data. Telecommunications Policy, 46(5), 102285.","journal-title":"Telecommunications Policy"},{"key":"11342_CR3","doi-asserted-by":"publisher","first-page":"104130","DOI":"10.1016\/j.compbiomed.2020.104130","volume":"129","author":"C Thapa","year":"2021","unstructured":"Thapa, C., & Camtepe, S. (2021). Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in biology and medicine, 129, 104130.","journal-title":"Computers in biology and medicine"},{"key":"11342_CR4","doi-asserted-by":"publisher","first-page":"104401","DOI":"10.1016\/j.ijmedinf.2021.104401","volume":"148","author":"U Shrivastava","year":"2021","unstructured":"Shrivastava, U., Song, J., Han, B. T., & Dietzman, D. (2021). Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? A cross-country investigation. International Journal of Medical Informatics, 148, 104401.","journal-title":"International Journal of Medical Informatics"},{"issue":"4","key":"11342_CR5","doi-asserted-by":"publisher","first-page":"337","DOI":"10.3390\/bioengineering11040337","volume":"11","author":"S Maleki Varnosfaderani","year":"2024","unstructured":"Maleki Varnosfaderani, S., & Forouzanfar, M. (2024). The Role of AI in hospitals and clinics: Transforming healthcare in the 21st century. Bioengineering, 11(4), 337.","journal-title":"Bioengineering"},{"key":"11342_CR6","doi-asserted-by":"crossref","unstructured":"Vidhyalakshmi, A. & Priya, C., (2020). Medical big data mining and processing in e-health care. In\u00a0An Industrial IoT Approach for Pharmaceutical Industry Growth 2 (pp. 1\u201330).\u00a0Academic Press.","DOI":"10.1016\/B978-0-12-821326-1.00001-2"},{"key":"11342_CR7","doi-asserted-by":"crossref","unstructured":"Hulkower, R., Penn, M. & Schmit, C., (2020). Privacy and confidentiality of public health information.\u00a0Public Health Informatics and Information Systems, pp.147\u2013166","DOI":"10.1007\/978-3-030-41215-9_9"},{"issue":"8","key":"11342_CR8","doi-asserted-by":"publisher","first-page":"e3634","DOI":"10.1002\/ett.3634","volume":"33","author":"MA Azad","year":"2022","unstructured":"Azad, M. A., Arshad, J., Mahmoud, S., Salah, K., & Imran, M. (2022). A privacy-preserving framework for smart context-aware healthcare applications. Transactions on Emerging Telecommunications Technologies, 33(8), e3634.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"14","key":"11342_CR9","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1080\/1369118X.2018.1477967","volume":"22","author":"J Kemper","year":"2019","unstructured":"Kemper, J., & Kolkman, D. (2019). Transparent to whom? No algorithmic accountability without a critical audience. Information, Communication & Society, 22(14), 2081\u20132096.","journal-title":"Information, Communication & Society"},{"key":"11342_CR10","doi-asserted-by":"publisher","first-page":"103360","DOI":"10.1016\/j.cose.2023.103360","volume":"132","author":"M Ashraf","year":"2023","unstructured":"Ashraf, M., Rady, S., Abdelkader, T., & Gharib, T. F. (2023). Efficient privacy preserving algorithms for hiding sensitive high utility itemsets. Computers & Security, 132, 103360.","journal-title":"Computers & Security"},{"key":"11342_CR11","doi-asserted-by":"publisher","first-page":"76268","DOI":"10.1109\/ACCESS.2022.3192447","volume":"10","author":"SM Darwish","year":"2022","unstructured":"Darwish, S. M., Essa, R. M., Osman, M. A., & Ismail, A. A. (2022). Privacy preserving data mining framework for negative association rules: An application to healthcare informatics. IEEE Access, 10, 76268\u201376280.","journal-title":"IEEE Access"},{"key":"11342_CR12","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.future.2020.11.026","volume":"117","author":"JMT Wu","year":"2021","unstructured":"Wu, J. M. T., Srivastava, G., Jolfaei, A., Fournier-Viger, P., & Lin, J. C. W. (2021). Hiding sensitive information in eHealth datasets. Future Generation Computer Systems, 117, 169\u2013180.","journal-title":"Future Generation Computer Systems"},{"key":"11342_CR13","doi-asserted-by":"publisher","first-page":"62591","DOI":"10.1109\/ACCESS.2023.3285407","volume":"11","author":"H Hamdi","year":"2023","unstructured":"Hamdi, H., Brahmi, Z., Alaerjan, A. S., & Mhamdi, L. (2023). Enhancing security and privacy preservation of sensitive information in e-Health datasets using FCA approach. IEEE Access, 11, 62591\u201362604. https:\/\/doi.org\/10.1109\/ACCESS.2023.3285407","journal-title":"IEEE Access"},{"key":"11342_CR14","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-030-48861-1_2","volume-title":"New Frontiers in Mining Complex Patterns: 8th International Workshop, NFMCP 2019, Held in Conjunction with ECML-PKDD 2019, W\u00fcrzburg, Germany, September 16, 2019, Revised Selected Papers","author":"S Jangra","year":"2020","unstructured":"Jangra, S., & Toshniowal, D. (2020). A Heuristic Approach for Sensitive Pattern Hiding with Improved Data\u00a0Quality. In M. Ceci, C. Loglisci, G. Manco, E. Masciari, & Z. Ras (Eds.), New Frontiers in Mining Complex Patterns: 8th International Workshop, NFMCP 2019, Held in Conjunction with ECML-PKDD 2019, W\u00fcrzburg, Germany, September 16, 2019, Revised Selected Papers (pp. 21\u201335). Cham: Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-48861-1_2"},{"key":"11342_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2023.3271591","author":"AK Sangaiah","year":"2024","unstructured":"Sangaiah, A. K., Javadpour, A., Ja\u2019fari, F., Pinto, P., & Chuang, H. M. (2024). Privacy-aware and AI techniques for healthcare based on k-anonymity model in internet of things. IEEE Transactions on Engineering Management. https:\/\/doi.org\/10.1109\/TEM.2023.3271591","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"2","key":"11342_CR16","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.asej.2019.10.003","volume":"11","author":"AM Hemeida","year":"2020","unstructured":"Hemeida, A. M., Alkhalaf, S., Mady, A., Mahmoud, E. A., Hussein, M. E., & Eldin, A. M. B. (2020). Implementation of nature-inspired optimization algorithms in some data mining tasks. Ain Shams Engineering Journal, 11(2), 309\u2013318.","journal-title":"Ain Shams Engineering Journal"},{"key":"11342_CR17","doi-asserted-by":"publisher","first-page":"108870","DOI":"10.1016\/j.asoc.2022.108870","volume":"122","author":"C Fernandez-Basso","year":"2022","unstructured":"Fernandez-Basso, C., Guti\u00e9rrez-Batista, K., Morcillo-Jim\u00e9nez, R., Vila, M. A., & Martin-Bautista, M. J. (2022). A fuzzy-based medical system for pattern mining in a distributed environment: Application to diagnostic and co-morbidity. Applied Soft Computing, 122, 108870.","journal-title":"Applied Soft Computing"},{"issue":"12","key":"11342_CR18","doi-asserted-by":"publisher","first-page":"4241","DOI":"10.1007\/s10489-020-01749-6","volume":"50","author":"S Sharma","year":"2020","unstructured":"Sharma, S., & Toshniwal, D. (2020). MR-OVnTSA: A heuristics based sensitive pattern hiding approach for big data. Applied Intelligence, 50(12), 4241\u20134260.","journal-title":"Applied Intelligence"},{"key":"11342_CR19","unstructured":"Sinigaglia, C., Strata, P., Addabbo, M., Bolognini, N., Nava, E., Turati, C., Betti, V., Bevilacqua, V., Bocci, T., Bortoletto, M. and Bove, M., (2023). XXIII National Congress of the Italian Society of Psychophysiology."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11342-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11342-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11342-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T20:46:15Z","timestamp":1719866775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11342-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["11342"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11342-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]},"assertion":[{"value":"7 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Data sharing is not applicable to this article because of proprietary nature.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}},{"value":"Code sharing is not applicable to this article because of proprietary nature.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code Availability"}}]}}