{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:55:50Z","timestamp":1760597750568,"version":"3.37.3"},"reference-count":27,"publisher":"Informa UK Limited","issue":"6","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61503092"],"award-info":[{"award-number":["61503092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61503092"],"award-info":[{"award-number":["61503092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008462","name":"Fujian University of Technology","doi-asserted-by":"publisher","award":["10.13039\/501100001809"],"award-info":[{"award-number":["10.13039\/501100001809"]}],"id":[{"id":"10.13039\/501100008462","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Experimental &amp; Theoretical Artificial Intelligence"],"published-print":{"date-parts":[[2017,11,2]]},"DOI":"10.1080\/0952813x.2017.1328462","type":"journal-article","created":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T09:12:34Z","timestamp":1494839554000},"page":"1225-1245","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":21,"title":["Efficient hiding of confidential high-utility itemsets with minimal side effects"],"prefix":"10.1080","volume":"29","author":[{"given":"Jerry Chun-Wei","family":"Lin","sequence":"first","affiliation":[{"name":"Fujian Provincial Key Laboatory of Big Data Mining and Applications, Fujian University of Technology, Fujian, China."},{"name":"School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China."}]},{"given":"Tzung-Pei","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National University of Kaohsiung, Kaohsiung, Taiwan."},{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7680-9899","authenticated-orcid":false,"given":"Philippe","family":"Fournier-Viger","sequence":"additional","affiliation":[{"name":"School of Natural Sciences and Humanities, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China."}]},{"given":"Qiankun","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China."}]},{"given":"Jia-Wei","family":"Wong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan."}]},{"given":"Justin","family":"Zhan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Nevada, Las Vegas, NV, USA."}]}],"member":"301","published-online":{"date-parts":[[2017,5,15]]},"reference":[{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03095-1_59"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0127834"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-015-0671-0"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"CIT0013","first-page":"54","volume":"1","author":"Fournier-Viger P.","year":"2017","journal-title":"Data Science and Pattern Recognition"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221854"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"CIT0016","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1090.001.0001","volume-title":"Adaptation in natural and artificial systems","author":"Holland J. H.","year":"1992"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-012-0377-5"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.03.014"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.12.082"},{"key":"CIT0021","first-page":"201","volume":"4","author":"Lin C. W.","year":"2013","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"journal-title":"Scientific World Journal","year":"2014","author":"Lin C. W.","key":"CIT0022"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.12.019"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23207-2_6"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.08.022"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.09.013"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2510012"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1007\/11430919_79"},{"key":"CIT0031","first-page":"43","volume":"14","author":"Oliveria S. R. M.","year":"2002","journal-title":"IEEE International Conference on Privacy, Security and Data Mining"},{"key":"CIT0032","doi-asserted-by":"crossref","first-page":"933","DOI":"10.3233\/IDA-2012-00560","volume":"16","author":"Rajalaxmi R. R.","year":"2012","journal-title":"Intelligent Data Analysis"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.250583"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.10.004"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.038"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.037"}],"container-title":["Journal of Experimental &amp; Theoretical Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0952813X.2017.1328462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T13:15:50Z","timestamp":1569330950000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0952813X.2017.1328462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,15]]},"references-count":27,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2017,4,5]]},"published-print":{"date-parts":[[2017,11,2]]}},"alternative-id":["10.1080\/0952813X.2017.1328462"],"URL":"https:\/\/doi.org\/10.1080\/0952813x.2017.1328462","relation":{},"ISSN":["0952-813X","1362-3079"],"issn-type":[{"type":"print","value":"0952-813X"},{"type":"electronic","value":"1362-3079"}],"subject":[],"published":{"date-parts":[[2017,5,15]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teta20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teta20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}