{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:58:39Z","timestamp":1771232319518,"version":"3.50.1"},"reference-count":65,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8622405","type":"proceedings-article","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T03:07:18Z","timestamp":1548385638000},"page":"2617-2626","source":"Crossref","is-referenced-by-count":50,"title":["Privacy Preserving Utility Mining: A Survey"],"prefix":"10.1109","author":[{"given":"Wensheng","family":"Gan","sequence":"first","affiliation":[]},{"given":"Jerry","family":"Chun-Wei","sequence":"additional","affiliation":[]},{"given":"Han-Chieh","family":"Chao","sequence":"additional","affiliation":[]},{"given":"Shyue-Liang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2015.05.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.12.003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.12.019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0986-0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.11.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08326-1_9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0991-3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2458860"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2017.04.007"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2015.06.002"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2833258.2833271"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2018.01.005"},{"key":"ref61","first-page":"435","article-title":"An approach to decrease execution time and difference for hiding high utility sequential patterns","author":"quang","year":"2016","journal-title":"Proceedings of the International Symposium on Integrated Uncertainty in Knowledge Modeling and Decision Making"},{"key":"ref63","first-page":"13","article-title":"MHHUSP: An integrated algorithm for mining and hiding high utility sequential patterns","author":"quang","year":"2016","journal-title":"The Eighth International Conference on Knowledge and Systems Engineering"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396773"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s41066-015-0011-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835839"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1216"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.20"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_8"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.aei.2016.02.003","article-title":"Fast algorithms for mining high-utility itemsets with various discount strategies","volume":"30","author":"lin","year":"2016","journal-title":"Advanced Engineering Informatics"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-557-3.ch189"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11430919_79"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.108"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.12.082"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.46"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-012-0377-5"},{"key":"ref51","first-page":"1424","article-title":"Mining sequential patterns by pattern-growth: The prefixspan approach","author":"pei","year":"2004","journal-title":"IEEE Transactions on Knowledge & Data Engineering"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020605"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2001-5203"},{"key":"ref57","first-page":"760","article-title":"Particle swarm optimization","author":"kennedy","year":"2011","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref56","article-title":"Handbook of genetic algorithms","author":"davis","year":"1991"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2012-00560"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2017.1328462"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/804629"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0006-6"},{"key":"ref10","article-title":"A survey of utility-oriented pattern mining","author":"gan","year":"2018","journal-title":"arXiv preprint arXiv 1805 10511"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.1510.0066"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1242"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339636"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487654"},{"key":"ref15","author":"marshall","year":"2009","journal-title":"Principles of economics unabridged eighth edition"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.038"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.037"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/235837"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/398269"},{"key":"ref4","volume":"29","author":"agrawal","year":"2000","journal-title":"Privacy-preserving data mining"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref5","first-page":"36","article-title":"Privacy preserving data mining","author":"lindell","year":"2000","journal-title":"International Cryptology Conference on Advances in Cryptology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.10.004"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1186\/s40064-015-1481-x","article-title":"A comprehensive review on privacy preserving data mining","volume":"4","author":"aldeen","year":"2015","journal-title":"Springer Plus"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.59"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.136"},{"key":"ref45","first-page":"8","article-title":"A border-based approach for hiding sensitive frequent itemsets","author":"sun","year":"2005","journal-title":"Proceedings of the Fifth IEEE International Conference on Data Mining"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.250583"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2006.12.003"},{"key":"ref42","first-page":"37","article-title":"From data mining to knowledge discovery in databases","volume":"17","author":"fayyad","year":"1996","journal-title":"AI Magazine"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18032-8_51"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1269668"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_12"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","location":"Seattle, WA, USA","start":{"date-parts":[[2018,12,10]]},"end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08622405.pdf?arnumber=8622405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:24:15Z","timestamp":1643239455000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8622405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8622405","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}