{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:15Z","timestamp":1750306275156,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905231","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A New Algorithm for Privacy Preservation in Utility Mining Using Genetic Algorithm"],"prefix":"10.1145","author":[{"given":"Sugandha","family":"Rathi","sequence":"first","affiliation":[{"name":"Dept. of CSE, ITM, Gwalior, M.P., India"}]},{"given":"Rishi","family":"Soni","sequence":"additional","affiliation":[{"name":"Dept. of CSE, ITM, Gwalior, M.P., India"}]},{"given":"Virendra Singh","family":"Kushwah","sequence":"additional","affiliation":[{"name":"Dept. of CSE, ITM, Gwalior, M.P., India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"53","volume":"37","author":"Fayyad U.M.","year":"1996","unstructured":"Fayyad , U.M. , Shapiro , G. P. and Smyth , P. Data Mining to Knowledge Discovery in Databases. ISSN 0738-4602. AI Magazine , 1996 , 37 -- 53 . Fayyad, U.M., Shapiro, G. P. and Smyth, P. Data Mining to Knowledge Discovery in Databases. ISSN 0738-4602. AI Magazine, 1996, 37--53.","journal-title":"AI Magazine"},{"volume-title":"Data Mining: Concepts and Techniques","author":"Han J","key":"e_1_3_2_1_2_1","unstructured":"Han J and Kamber M . Data Mining: Concepts and Techniques . Second edition Morgan Kaufmann Publishers . Han J and Kamber M. Data Mining: Concepts and Techniques. Second edition Morgan Kaufmann Publishers."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0006-6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0010-5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_7_1","volume-title":"An Improved Approach to High Level Privacy Preserving Itemset Mining, (IJCSIS) International Journal of Computer Science and Information Security","author":"Boora R. K.","year":"2009","unstructured":"Boora , R. K. , Shukla , R. , Misra , A.K. An Improved Approach to High Level Privacy Preserving Itemset Mining, (IJCSIS) International Journal of Computer Science and Information Security , 2009 , Vol. 6 , No. 3. Boora, R. K., Shukla, R., Misra, A.K. An Improved Approach to High Level Privacy Preserving Itemset Mining, (IJCSIS) International Journal of Computer Science and Information Security, 2009, Vol. 6, No. 3."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2009.4809232"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the ACM Intel. Conf. on Utility-Based Data Mining Workshop (UBDM)","author":"Yao H.","year":"2006","unstructured":"Yao H. , Hamilton , H. and Geng , L . A Unified Framework for Utilty-Based Measures for Mining Itemsets , In Proc. of the ACM Intel. Conf. on Utility-Based Data Mining Workshop (UBDM) , 2006 , 28--37. Yao H., Hamilton, H. and Geng, L. A Unified Framework for Utilty-Based Measures for Mining Itemsets, In Proc. of the ACM Intel. Conf. on Utility-Based Data Mining Workshop (UBDM), 2006, 28--37."},{"key":"e_1_3_2_1_10_1","volume-title":"Handbook of Genetic Algorithms, van Nostrand Reinhold","author":"Davis L.","year":"1991","unstructured":"Davis L. , Handbook of Genetic Algorithms, van Nostrand Reinhold , 1991 . Davis L., Handbook of Genetic Algorithms, van Nostrand Reinhold, 1991."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.038"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/804629"},{"key":"e_1_3_2_1_13_1","volume-title":"The 26th Workshop on Combinatorial Mathematics and Computation Theory","author":"Lan G.C.","year":"2009","unstructured":"Lan G.C. , Hong T. P. and Tseng V. S . A Novel Algorithm for Mining Rare-Utility Itemsets in a Multi-Database Environment , The 26th Workshop on Combinatorial Mathematics and Computation Theory , 2009 . Lan G.C., Hong T. P. and Tseng V. S. A Novel Algorithm for Mining Rare-Utility Itemsets in a Multi-Database Environment, The 26th Workshop on Combinatorial Mathematics and Computation Theory, 2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.02.003"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2014.1000396"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905231","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905231"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":15,"alternative-id":["10.1145\/2905055.2905231","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905231","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}