{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:15:14Z","timestamp":1766157314270,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,8,24]],"date-time":"2008-08-24T00:00:00Z","timestamp":1219536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,8,24]]},"DOI":"10.1145\/1401890.1401997","type":"proceedings-article","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T11:56:41Z","timestamp":1219838201000},"page":"893-901","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Detecting privacy leaks using corpus-based association rules"],"prefix":"10.1145","author":[{"given":"Richard","family":"Chow","sequence":"first","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA, USA"}]},{"given":"Philippe","family":"Golle","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA, USA"}]},{"given":"Jessica","family":"Staddon","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,8,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"307","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Agrawal R.","year":"1996","unstructured":"R. Agrawal , H. Mannila , R. Srikant , H. Toivonen , and A. I. Verkamo . Fast discovery of association rules . In Advances in Knowledge Discovery and Data Mining , pages 307 -- 328 . AAAI\/MIT Press , 1996 . R. Agrawal, H. Mannila, R. Srikant, H. Toivonen, and A. I. Verkamo. Fast discovery of association rules. In Advances in Knowledge Discovery and Data Mining, pages 307--328. AAAI\/MIT Press, 1996."},{"key":"e_1_3_2_1_2_1","first-page":"487","volume-title":"Proc. 20th Int. Conf. Very Large Data Bases, VLDB","author":"Agrawal R.","year":"1994","unstructured":"R. Agrawal and R. Srikant . Fast algorithms for mining association rules. In J. B. Bocca, M. Jarke, and C. Zaniolo, editors , Proc. 20th Int. Conf. Very Large Data Bases, VLDB , pages 487 -- 499 . Morgan Kaufmann, 12--15 1994 . R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In J. B. Bocca, M. Jarke, and C. Zaniolo, editors, Proc. 20th Int. Conf. Very Large Data Bases, VLDB, pages 487--499. Morgan Kaufmann, 12--15 1994."},{"key":"e_1_3_2_1_3_1","unstructured":"M. Ahlers. Blueprints for terrorists? On the Web at http:\/\/www.cnn.com\/2004\/US\/10\/19\/terror.nrc\/index.html. M. Ahlers. Blueprints for terrorists? On the Web at http:\/\/www.cnn.com\/2004\/US\/10\/19\/terror.nrc\/index.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache Lucene project. On the Web at http:\/\/lucene.apache.org\/. Apache Lucene project. On the Web at http:\/\/lucene.apache.org\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11504894_68"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"W. Broad. U. S. web archive is said to reveal a nuclear primer. On the Web at http:\/\/www.nytimes.com\/2006\/11\/03\/world\/middleeast\/03documents.html. W. Broad. U. S. web archive is said to reveal a nuclear primer. On the Web at http:\/\/www.nytimes.com\/2006\/11\/03\/world\/middleeast\/03documents.html.","DOI":"10.1063\/pt.5.020596"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1046456.1046460"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060781"},{"key":"e_1_3_2_1_9_1","unstructured":"Enron corpus. On the Web at http:\/\/www.cs.cmu.edu\/~enron\/. Enron corpus. On the Web at http:\/\/www.cs.cmu.edu\/~enron\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772864"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/359784.360293"},{"key":"e_1_3_2_1_12_1","unstructured":"Health Privacy Project. On the Web at http:\/\/www.healthprivacy.org\/. Health Privacy Project. On the Web at http:\/\/www.healthprivacy.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Inboxer. On the Web at http:\/\/www.inboxer.com\/. Inboxer. On the Web at http:\/\/www.inboxer.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Inboxer's Enron demonstration site. On the Web at http:\/\/www.enronemail.com\/. Inboxer's Enron demonstration site. On the Web at http:\/\/www.enronemail.com\/."},{"key":"e_1_3_2_1_15_1","volume-title":"Natural Language Processing and Knowledge Representation: Language for Knowledge and Knowledge for Language","author":"Iwanska L. M.","year":"2000","unstructured":"L. M. Iwanska and S. C. Shapiro . Natural Language Processing and Knowledge Representation: Language for Knowledge and Knowledge for Language . AAAI Press , 2000 . L. M. Iwanska and S. C. Shapiro. Natural Language Processing and Knowledge Representation: Language for Knowledge and Knowledge for Language. AAAI Press, 2000."},{"key":"e_1_3_2_1_16_1","first-page":"183","volume-title":"DRR","author":"Lopresti D. P.","year":"2005","unstructured":"D. P. Lopresti and A. L. Spitz . Information leakage through document redaction: attacks and countermeasures . In DRR , pages 183 -- 190 , 2005 . D. P. Lopresti and A. L. Spitz. Information leakage through document redaction: attacks and countermeasures. In DRR, pages 183--190, 2005."},{"key":"e_1_3_2_1_17_1","volume-title":"Foundations of statistical natural language processing","author":"Manning C. D.","year":"1999","unstructured":"C. D. Manning and H. Schutze . Foundations of statistical natural language processing . MIT Press , 1999 . C. D. Manning and H. Schutze. Foundations of statistical natural language processing. MIT Press, 1999."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3115\/1220575.1220680"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/266714.266895"},{"key":"e_1_3_2_1_20_1","first-page":"71","volume-title":"Proceedings of 16th USENIX Security Symposium","author":"Staddon J.","year":"2007","unstructured":"J. Staddon , P. Golle , and B. Zimny . Web-based inference detection . In Proceedings of 16th USENIX Security Symposium , pages 71 -- 86 , Boston, MA , 2007 . USENIX Association. J. Staddon, P. Golle, and B. Zimny. Web-based inference detection. In Proceedings of 16th USENIX Security Symposium, pages 71--86, Boston, MA, 2007. USENIX Association."},{"key":"e_1_3_2_1_21_1","volume-title":"AAAI Spring Symposium on AI TEchnologies for Homeland Security","author":"Sweeney L.","year":"2005","unstructured":"L. Sweeney . AI technologies to defeat identity theft vulnerabilities . In AAAI Spring Symposium on AI TEchnologies for Homeland Security , 2005 . L. Sweeney. AI technologies to defeat identity theft vulnerabilities. In AAAI Spring Symposium on AI TEchnologies for Homeland Security, 2005."},{"issue":"2","key":"e_1_3_2_1_22_1","volume":"2007","author":"Terry N.","unstructured":"N. Terry and L. Francis . Ensuring the privacy and confidentiality of electronic health records. Illinois Law Review , 2007 ( 2 ). N. Terry and L. Francis. Ensuring the privacy and confidentiality of electronic health records. Illinois Law Review, 2007(2).","journal-title":"Illinois Law Review"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/645328.650004"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1198396"},{"key":"e_1_3_2_1_25_1","unstructured":"Yahoo! Web Search API. On the Web at http:\/\/developer.yahoo.com\/search\/web\/. Yahoo! Web Search API. On the Web at http:\/\/developer.yahoo.com\/search\/web\/."}],"event":{"name":"KDD08: The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"],"location":"Las Vegas Nevada USA","acronym":"KDD08"},"container-title":["Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401890.1401997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1401890.1401997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:58:05Z","timestamp":1750255085000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401890.1401997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8,24]]},"references-count":25,"alternative-id":["10.1145\/1401890.1401997","10.1145\/1401890"],"URL":"https:\/\/doi.org\/10.1145\/1401890.1401997","relation":{},"subject":[],"published":{"date-parts":[[2008,8,24]]},"assertion":[{"value":"2008-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}