{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:24:12Z","timestamp":1758273852950},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11704-016-6061-x","type":"journal-article","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T10:47:50Z","timestamp":1510224470000},"page":"1241-1254","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["M-generalization for multipurpose transactional data publication"],"prefix":"10.1007","volume":"12","author":[{"given":"Xianxian","family":"Li","sequence":"first","affiliation":[]},{"given":"Peipei","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Li-E","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,19]]},"reference":[{"key":"6061_CR1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/1755688.1755693","volume-title":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security.","author":"C C Chang","year":"2010","unstructured":"Chang C C, Thompson B, Wang H W, Yao D. Towards publishing recommendation data with predictive anonymization. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. 2010, 24\u201335"},{"key":"6061_CR2","first-page":"401","volume-title":"Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.","author":"Z J Zheng","year":"2001","unstructured":"Zheng Z J, Kohavi R, Mason L. Real world performance of association rule algorithms. In: Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2001, 401\u2013406"},{"key":"6061_CR3","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-319-27161-3_11","volume-title":"Proceedings of International Conference on Algorithms and Architectures for Parallel Processing.","author":"L E Wang","year":"2015","unstructured":"Wang L E, Li X X. A hybrid optimization approach for anonymizing transactional data. In: Proceedings of International Conference on Algorithms and Architectures for Parallel Processing. 2015, 120\u2013132"},{"key":"6061_CR4","first-page":"715","volume-title":"Proceedings of the 24th IEEE International Conference on Data Engineering.","author":"G Ghinita","year":"2008","unstructured":"Ghinita G, Tao Y F, Kalnis P. On the anonymization of sparse highdimensional data. In: Proceedings of the 24th IEEE International Conference on Data Engineering. 2008, 715\u2013724"},{"issue":"1","key":"6061_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.14778\/1453856.1453874","volume":"1","author":"M Terrovitis","year":"2008","unstructured":"Terrovitis M, Mamoulis N, Kalnis P. Privacy-preserving anonymization of set-valued data. Proceedings of the VLDB Endowment, 2008, 1(1): 115\u2013125","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"1","key":"6061_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s00778-010-0192-8","volume":"20","author":"M Terrovitis","year":"2011","unstructured":"Terrovitis M, Mamoulis N, Kalnis P. Local and global recoding methods for anonymizing set-valued data. The VLDB Journal\u2014The International Journal on Very Large Data Bases, 2011, 20(1): 83\u2013106","journal-title":"The VLDB Journal\u2014The International Journal on Very Large Data Bases"},{"issue":"1","key":"6061_CR7","doi-asserted-by":"publisher","first-page":"934","DOI":"10.14778\/1687627.1687733","volume":"2","author":"Y Y He","year":"2009","unstructured":"He Y Y, Naughton J F. Anonymization of set-valued data via topdown, local generalization. Proceedings of the VLDB Endowment, 2009, 2(1): 934\u2013945","journal-title":"Proceedings of the VLDB Endowment"},{"key":"6061_CR8","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-13657-3_20","volume-title":"Proceedings of Pacific-Asia Conference on Knowledge Discovery and Data Mining.","author":"J Q Liu","year":"2010","unstructured":"Liu J Q, Wang K. Anonymizing transaction data by integrating suppression and generalization. In: Proceedings of Pacific-Asia Conference on Knowledge Discovery and Data Mining. 2010, 171\u2013180"},{"key":"6061_CR9","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1145\/1401890.1401982","volume-title":"Proceedings of the 14th ACM SIGKDD Nternational Conference on Knowledge Discovery and Data Mining.","author":"Y B Xu","year":"2008","unstructured":"Xu Y B, Wang K, Fu A W C, Yu P S. Anonymizing transaction databases for publication. In: Proceedings of the 14th ACM SIGKDD Nternational Conference on Knowledge Discovery and Data Mining. 2008, 767\u2013775"},{"issue":"2","key":"6061_CR10","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TKDE.2010.101","volume":"23","author":"G Ghinita","year":"2011","unstructured":"Ghinita G, Kalnis P, Tao Y F. Anonymous publication of sensitive transactional data. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(2): 161\u2013174","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1\u20132","key":"6061_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1900000008","volume":"2","author":"B Chen","year":"2009","unstructured":"Chen B, Kifer D, Le Fevre K, Machanavajjhala A. Privacy-preserving data publishing. Foundations and Trends in databases, 2009, 2(1\u20132): 1\u2013167","journal-title":"Foundations and Trends in databases"},{"issue":"4","key":"6061_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1749603.1749605","volume":"42","author":"B C M Fung","year":"2010","unstructured":"Fung B C M, Wang K, Chen R, Yu P S. Privacy-preserving data publishing: a survey on recent developments. ACM Computing Surveys (CSUR), 2010, 42(4): 14","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"6061_CR13","first-page":"353","volume-title":"Proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases.","author":"G Poulis","year":"2013","unstructured":"Poulis G, Loukides G, Gkoulalas-Divanis A, Skiadopoulos S. Anonymizing data with relational and transaction attributes. In: Proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases. 2013, 353\u2013369"},{"key":"6061_CR14","first-page":"373","volume-title":"Proceedings of the 11th IEEE Annual International Conference on Privacy, Security and Trust.","author":"T Takahashi","year":"2013","unstructured":"Takahashi T, Sobataka K, Takenouchi T, Toyoda Y, Mori T, Kohro T. Top-down itemset recoding for releasing private complex data. In: Proceedings of the 11th IEEE Annual International Conference on Privacy, Security and Trust. 2013, 373\u2013376"},{"issue":"1","key":"6061_CR15","first-page":"223","volume":"5","author":"A Gkoulalas-Divanis","year":"2012","unstructured":"Gkoulalas-Divanis A, Loukides G. Utility-guided clustering-based transaction data anonymization. Transactions on Data Privacy, 2012, 5(1): 223\u2013251","journal-title":"Transactions on Data Privacy"},{"issue":"1","key":"6061_CR16","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s00778-009-0167-9","volume":"19","author":"G Cormode","year":"2010","unstructured":"Cormode G, Srivastava D, Yu T, Zhang, Q. Anonymizing bipartite graph data using safe groupings. The VLDB Journal\u2014The International Journal on Very Large Data Bases, 2010, 19(1): 115\u2013139","journal-title":"The VLDB Journal\u2014The International Journal on Very Large Data Bases"},{"key":"6061_CR17","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1145\/1807167.1807248","volume-title":"Proceedings of ACM SIGMOD International Conference on Management of Data.","author":"W K Wong","year":"2010","unstructured":"Wong W K, Mamoulis N, Cheung D WL. Non-homogeneous generalization in privacy preserving data publishing. In: Proceedings of ACM SIGMOD International Conference on Management of Data. 2010, 747\u2013758"},{"issue":"6","key":"6061_CR18","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati P. Protecting respondents\u2019 identities in microdata release. IEEE transactions on Knowledge and Data Engineering, 2001, 13(6): 1010\u20131027","journal-title":"IEEE transactions on Knowledge and Data Engineering"},{"issue":"05","key":"6061_CR19","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L. k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(05): 557\u2013570","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"1","key":"6061_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. ldiversity: privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 2007, 1(1): 3","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"6061_CR21","first-page":"106","volume-title":"Proceedings of the 23rd IEEE International Conference on Data Engineering.","author":"N H Li","year":"2007","unstructured":"Li N H, Li T C, Venkatasubramanian S. t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd IEEE International Conference on Data Engineering. 2007, 106\u2013115"},{"key":"6061_CR22","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1145\/2339530.2339696","volume-title":"Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.","author":"M Q Xue","year":"2012","unstructured":"Xue M Q, Karras P, Ra\u00efssi C, Vaidya J, Tan K L. Anonymizing setvalued data by nonreciprocal recoding. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2012, 1050\u20131058"},{"issue":"1\u20132","key":"6061_CR23","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.14778\/1920841.1920971","volume":"3","author":"J N Cao","year":"2010","unstructured":"Cao J N, Karras P, Ra\u00efssi C, Tan K L. ?-uncertainty: inference-proof transaction anonymization. Proceedings of the VLDB Endowment, 2010, 3(1\u20132): 1033\u20131044","journal-title":"Proceedings of the VLDB Endowment"},{"key":"6061_CR24","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-642-15364-8_34","volume-title":"Proceedings of International Conference on Database and Expert Systems Applications.","author":"G Loukides","year":"2010","unstructured":"Loukides G, Gkoulalas-Divanis A, Shao J H. Anonymizing transaction data to eliminate sensitive inferences. In: Proceedings of International Conference on Database and Expert Systems Applications. 2010, 400\u2013415"},{"issue":"1","key":"6061_CR25","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10115-012-0544-3","volume":"36","author":"G Loukides","year":"2013","unstructured":"Loukides G, Gkoulalas-Divanis A, Shao J H. Efficient and flexible anonymization of transaction data. Knowledge and Information Systems, 2013, 36(1): 153\u2013210","journal-title":"Knowledge and Information Systems"},{"key":"6061_CR26","first-page":"58","volume-title":"Proceedings of IFIP International Workshop on Information Security Theory and Practice.","author":"J Zhou","year":"2012","unstructured":"Zhou J, Jing J W, Xiang J, Wang L. Privacy preserving social network publication on bipartite graphs. In: Proceedings of IFIP International Workshop on Information Security Theory and Practice. 2012, 58\u201370"},{"issue":"07","key":"6061_CR27","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1142\/S0218194014500363","volume":"24","author":"L E Wang","year":"2014","unstructured":"Wang L E, Li X X. A clustering-based bipartite graph privacypreserving approach for sharing high-dimensional data. International Journal of Software Engineering and Knowledge Engineering, 2014, 24(07): 1091\u20131111","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"6061_CR28","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-319-14717-8_20","volume-title":"Proceedings of International Conference on Advanced Data Mining and Applications.","author":"L E Wang","year":"2014","unstructured":"Wang L E, Li XX. Personalized privacy protection for transactional data. In: Proceedings of International Conference on Advanced Data Mining and Applications. 2014, 253\u2013266"},{"issue":"2","key":"6061_CR29","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s10115-010-0354-4","volume":"28","author":"G Loukides","year":"2011","unstructured":"Loukides G, Gkoulalas-Divanis A, Malin B. COAT: constraint-based anonymization of transactions. Knowledge and Information Systems, 2011, 28(2): 251\u2013282","journal-title":"Knowledge and Information Systems"},{"key":"6061_CR30","first-page":"744","volume-title":"Proceedings of the 24th IEEE International Conference on Data Engineering.","author":"A Gionis","year":"2008","unstructured":"Gionis A, Mazza A, Tassa T. k-Anonymization revisited. In: Proceedings of the 24th IEEE International Conference on Data Engineering. 2008, 744\u2013753"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-016-6061-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-6061-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-6061-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T22:16:38Z","timestamp":1659824198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-016-6061-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":30,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["6061"],"URL":"https:\/\/doi.org\/10.1007\/s11704-016-6061-x","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"30 January 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}