{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:16:29Z","timestamp":1730222189119,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/fskd.2012.6233857","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T23:43:25Z","timestamp":1342741405000},"page":"757-760","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-preservation association rules mining based on fuzzy correlation"],"prefix":"10.1109","author":[{"given":"Huajin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chengfu","family":"Yi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Disclosure limitation of sensitive rules","author":"atallah","year":"1999","journal-title":"The Knowledge and Data Engineering Exchange 1999 (KDEX '99)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"10","first-page":"1793","article-title":"Privacy preserving fuzzy association rules hididng in quantitative data","volume":"1","author":"gupta","year":"2009","journal-title":"International Journal of Computer Theory and Engineering"},{"year":"0","key":"1"},{"key":"7","article-title":"A border-based approach for hiding fuzzy weighted sensitve itemsets","author":"toshniwal","year":"2010","journal-title":"Presented at the International Conference on DMIN'10"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"5","article-title":"Privacy preserving frequent itemset mining","author":"oliveira","year":"2002","journal-title":"Privacy Security and Data Mining"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_27"},{"key":"9","article-title":"Fast algorithms for mining association rules","author":"agrawal","year":"1994","journal-title":"VLDB Conference Proceedings"},{"key":"8","article-title":"Fuzzy correlation rules mining","author":"lin","year":"2007","journal-title":"The 6th WSEAS International Conference on Applied Computer Science"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GPC.WORKSHOPS.2008.33"},{"year":"0","key":"12"}],"event":{"name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2012,5,29]]},"location":"Chongqing, Sichuan, China","end":{"date-parts":[[2012,5,31]]}},"container-title":["2012 9th International Conference on Fuzzy Systems and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6227654\/6233707\/06233857.pdf?arnumber=6233857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:47:59Z","timestamp":1490104079000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6233857\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/fskd.2012.6233857","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}