{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:10:13Z","timestamp":1772824213095,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932006"],"award-info":[{"award-number":["61932006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772434"],"award-info":[{"award-number":["61772434"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61806169"],"award-info":[{"award-number":["61806169"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&amp;D Program of China","award":["2018AAA0100101"],"award-info":[{"award-number":["2018AAA0100101"]}]},{"name":"Chongqing Technology Innovation and Application Development Project","award":["cstc2020jscx-msxmX0156"],"award-info":[{"award-number":["cstc2020jscx-msxmX0156"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1109\/tetci.2021.3127523","type":"journal-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:37:11Z","timestamp":1638909431000},"page":"1247-1257","source":"Crossref","is-referenced-by-count":9,"title":["Minable Data Publication Based on Sensitive Association Rule Hiding"],"prefix":"10.1109","volume":"6","author":[{"given":"Fan","family":"Yang","sequence":"first","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"given":"Xinyu","family":"Lei","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]},{"given":"Junqing","family":"Le","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8126-8126","authenticated-orcid":false,"given":"Nankun","family":"Mu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3566-8161","authenticated-orcid":false,"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.01.044"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2021.3067017"},{"key":"ref3","first-page":"322","article-title":"Traffic flow prediction method based on spatio-temporal feature mining","volume":"46","author":"Kong","year":"2019","journal-title":"Comput. Sci."},{"key":"ref4","author":"Dworkin","year":"2001","journal-title":"Advanced Encryption Standard"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217750"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.05.022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2016.1268038"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.07.031"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.08.005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3001316"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2932065"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.073"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_27"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/c2019-0-03762-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICACI52617.2021.9435860"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA.2017.8003119"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-020-01003-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32112-2_50"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.10.048"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2613521"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-019-01524-2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2939373"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2021.3074919"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4018\/IJIIT.2017040101"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0590-5"},{"issue":"12","key":"ref28","first-page":"2087","article-title":"Improved genetic algorithm approach for sensitive association rules hiding","volume":"31","author":"Khan","year":"2014","journal-title":"World Appl. Sci. J."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.060"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2916051"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3000224"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2018.2814577"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.09.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.055"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-160817"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2018.2881153"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-020-1253-0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2017.2672689"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7433297\/9900106\/09638990.pdf?arnumber=9638990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T20:39:20Z","timestamp":1709325560000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9638990\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":38,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2021.3127523","relation":{},"ISSN":["2471-285X"],"issn-type":[{"value":"2471-285X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10]]}}}