{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:28:10Z","timestamp":1761989290819,"version":"3.37.3"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100012156","name":"Shenzhen Technical Project","doi-asserted-by":"publisher","award":["JCYJ20170307151733005","KQJSCX20170726103424709"],"award-info":[{"award-number":["JCYJ20170307151733005","KQJSCX20170726103424709"]}],"id":[{"id":"10.13039\/501100012156","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2899831","type":"journal-article","created":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T19:25:02Z","timestamp":1550517902000},"page":"25359-25368","source":"Crossref","is-referenced-by-count":40,"title":["A Sanitization Approach to Secure Shared Data in an IoT Environment"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8768-9709","authenticated-orcid":false,"given":"Jerry Chun-Wei","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3740-2102","authenticated-orcid":false,"given":"Jimmy Ming-Tai","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Fournier-Viger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0135-7450","authenticated-orcid":false,"given":"Youcef","family":"Djenouri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1515-4243","authenticated-orcid":false,"given":"Chun-Hao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yuyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/398269"},{"key":"ref38","first-page":"201","article-title":"A greedy-based approach for hiding sensitive itemsets by transaction insertion","volume":"4","author":"lin","year":"2013","journal-title":"J Inf Hiding Multimedia Signal Process"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2010.08.017"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.05.011"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-3-540-74553-2_38","article-title":"Privacy-preserving genetic algorithms for rule discovery","author":"han","year":"2007","journal-title":"Proc Int Conf on Data Warehousing and Knowledge Discovery"},{"key":"ref37","first-page":"6","article-title":"Privacy preserving data mining","author":"lindell","year":"2000","journal-title":"Proc Annu Int Cryptol Conf Adv Cryptol"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-007-9149-x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.1999.781913"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-012-0377-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2001-5203"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"ref2","first-page":"487","article-title":"Fast algorithms for mining association rules in large databases","author":"agrawal","year":"1994","journal-title":"Proc 5th Int Conf Very Large Data Bases"},{"journal-title":"Quest Synthetic Data Generator IBM Almaden Research Center","year":"1994","author":"agrawal","key":"ref1"},{"key":"ref20","first-page":"36","article-title":"The SPMF open-source data mining library version 2","author":"fournier-viger","year":"2016","journal-title":"Proc Eur Conf Mach Learn Knowl Discovery Databases"},{"journal-title":"Genetic Algorithms in Search Optimization and Machine Learning","year":"1989","author":"goldberg","key":"ref22"},{"key":"ref21","first-page":"54","article-title":"A survey of sequential pattern mining","volume":"1","author":"fournier-viger","year":"2017","journal-title":"Data Sci Pattern Recognit"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1242"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1216"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1090.001.0001"},{"key":"ref25","article-title":"HUOPM: High utility occupancy pattern mining","author":"gan","year":"0","journal-title":"IEEE Trans Cybern"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.250583"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.003"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/4235.797969"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1996.492094"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/69.553155"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0590-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1004388"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-160817"},{"key":"ref15","first-page":"369","article-title":"Hiding association rules by using confidence and support","author":"dasseni","year":"2001","journal-title":"Proc Int Workshop Inf Hiding"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref17","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","volume":"3876","author":"dwork","year":"2006","journal-title":"Proc Theory Cryptography Conf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/775079.775080"},{"key":"ref19","first-page":"416","article-title":"Genetic algorithms for multiobjective optimization: Formulation, discussion and generalization","author":"fonseca","year":"1993","journal-title":"Proc Int Conf Genetic Algorithms"},{"key":"ref4","first-page":"45","article-title":"Disclosure limitation of sensitive rules","author":"atallah","year":"1999","journal-title":"Proc IEEE Knowledge Data Eng Exchange Workshop"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150460"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"ref9","first-page":"134","article-title":"Distributed optimization by ant colonies","author":"colorni","year":"1991","journal-title":"Proc Eur Conf Artif Life"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1994.2.3.221"},{"key":"ref45","first-page":"43","article-title":"Privacy preserving frequent itemset mining","author":"oliveira","year":"2002","journal-title":"Proc IEEE Int Conf Privacy Secur Data Mining"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2017.8166453"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2707489"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98812-2_45"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9492-7"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.10.010"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00208"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08643845.pdf?arnumber=8643845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T05:51:02Z","timestamp":1643262662000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8643845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2899831","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}