{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:34:06Z","timestamp":1760708046744,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/icde.2009.97","type":"proceedings-article","created":{"date-parts":[[2009,4,10]],"date-time":"2009-04-10T19:40:12Z","timestamp":1239392412000},"page":"18-29","source":"Crossref","is-referenced-by-count":11,"title":["Deriving Private Information from Association Rule Mining Results"],"prefix":"10.1109","author":[{"given":"Zutao","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Guan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"approximate inverse frequent itemset mining: privacy, complexity, and approximation","author":"wang","year":"2005","journal-title":"The 5th International Conference on Data Mining 2005"},{"key":"17","article-title":"on inverse frequet set mining","author":"mielikainen","year":"2003","journal-title":"Workshop on Privacy Preserving Date Mining In conjunction with The Third International Conference on Data Mining 2003"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.369027"},{"key":"15","article-title":"worst case background knowledge","author":"martin","year":"2007","journal-title":"Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE)"},{"key":"16","article-title":"m-invariance: towards privacy preserving republication of dynamic datasets","author":"xiao","year":"2007","journal-title":"Proceedings of the ACM Conference on Management of Data (SIGMOD)"},{"key":"13","article-title":"t-closeness: privacy beyond k-anonymity and ldiversity","author":"li","year":"2007","journal-title":"Proc Int l Conf Data Eng (ICDE)"},{"key":"14","article-title":"privacy skyline: privacy with multidimensional adversarial knowledge","author":"chen","year":"2007","journal-title":"Proceedings of VLDB"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.106.620"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014126"},{"journal-title":"Nonlinear Programming","year":"1995","author":"bertsekas","key":"22"},{"key":"23","first-page":"39","article-title":"a maximum entropy approach to natural language processing","volume":"22","author":"berger","year":"1996","journal-title":"Computational Linguistics"},{"key":"24","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/0-387-30065-1_4","article-title":"knitro: an integrated package for nonlinear optimization","author":"byrd","year":"2006","journal-title":"Large-Scale Nonlinear Optimization"},{"year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376665"},{"key":"27","article-title":"minimality attack in privacy preserving data publishing","author":"wong","year":"2007","journal-title":"Proceedings of the 33nd Very Large Data Bases conference (VLDB)"},{"key":"28","article-title":"information disclosure under realistic assumptions: privacy versus optimality","author":"zhang","year":"2007","journal-title":"14th ACM Conference on Computer and Communication Security"},{"journal-title":"Proceedings of ACM KDD","year":"2006","author":"wong","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"10","first-page":"139","article-title":"anatomy: simple and effective privacy preservation","author":"xiao","year":"2006","journal-title":"Proceedings of the 32nd Very Large Data Bases conference (VLDB)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"30","first-page":"487","article-title":"fast algorithms for mining association rules","author":"agrawal","year":"1994","journal-title":"Proceedings of International Conference on Very Large Databases (VLDB)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"journal-title":"UC Irvine Machine Learning Repository","year":"0","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/775079.775080"},{"article-title":"protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression","year":"1998","author":"samarati","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"}],"event":{"name":"2009 IEEE 25th International Conference on Data Engineering (ICDE)","start":{"date-parts":[[2009,3,29]]},"location":"Shanghai, China","end":{"date-parts":[[2009,4,2]]}},"container-title":["2009 IEEE 25th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4812371\/4812372\/04812388.pdf?arnumber=4812388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T18:46:35Z","timestamp":1497811595000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4812388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icde.2009.97","relation":{},"ISSN":["1084-4627"],"issn-type":[{"type":"print","value":"1084-4627"}],"subject":[],"published":{"date-parts":[[2009,3]]}}}