{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:30Z","timestamp":1750308570004,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,25]],"date-time":"2016-07-25T00:00:00Z","timestamp":1469404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,25]]},"DOI":"10.1145\/2925995.2926005","type":"proceedings-article","created":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T19:46:49Z","timestamp":1466192809000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["IMR based Anonymization for Privacy Preservation in Data Mining"],"prefix":"10.1145","author":[{"given":"G.","family":"Arumugam","sequence":"first","affiliation":[{"name":"Senior Professor and Head, Department of Computer Science, Madurai Kamaraj University, Madurai, Tamilnadu, India"}]},{"given":"V. Jane Varamani","family":"Sulekha","sequence":"additional","affiliation":[{"name":"Research Scholar, Department of Computer Science, Madurai Kamaraj University, Madurai, Tamilnadu, India"}]}],"member":"320","published-online":{"date-parts":[[2016,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.121"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery","author":"Chris Clifton","year":"1996","unstructured":"Chris Clifton and Donald Marks. Security and privacy implications of data mining . In Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery ( 1996 ), 15--19. Chris Clifton and Donald Marks. Security and privacy implications of data mining. In Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (1996), 15--19."},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"a survey of results","author":"Dwork C.","year":"2008","unstructured":"Dwork , C. Differential privacy : a survey of results . In Theory and Applications of Models of Computation---TAMC , pp. 1 -- 19 , 2008 . Dwork, C. Differential privacy: a survey of results. In Theory and Applications of Models of Computation---TAMC, pp. 1--19, 2008.","journal-title":"Theory and Applications of Models of Computation---TAMC"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.47"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032647.1033308"},{"key":"e_1_3_2_1_8_1","volume-title":"Secure multi-party computation. Final (incomplete) draft, version 1.4","author":"Goldreich O.","year":"2002","unstructured":"Goldreich , O. Secure multi-party computation. Final (incomplete) draft, version 1.4 , 2002 . Goldreich, O. Secure multi-party computation. Final (incomplete) draft, version 1.4, 2002."},{"key":"e_1_3_2_1_9_1","volume-title":"Data Mining: Concepts and Techniques","author":"Han J.","year":"2000","unstructured":"Han , J. , and Kamber , M . Data Mining: Concepts and Techniques . Morgan Kaufmann Publishers , 2000 Han, J., and Kamber, M. Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, 2000"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409620.1409624"},{"key":"e_1_3_2_1_12_1","volume-title":"A New Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy. Cybernetics and Information Technologies 13(Special Issue) \u2022","author":"Jian-Ming Zhu","year":"2013","unstructured":"Jian-Ming Zhu , Ning Zhang, Zhan-Yu Li . A New Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy. Cybernetics and Information Technologies 13(Special Issue) \u2022 December 2013 . Jian-Ming Zhu, Ning Zhang, Zhan-Yu Li. A New Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy. Cybernetics and Information Technologies 13(Special Issue) \u2022 December 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.06.052"},{"key":"e_1_3_2_1_14_1","first-page":"99","volume-title":"IEEE Computer Society","author":"Kargupta H.","year":"2003","unstructured":"Kargupta , H. , Datta , S. , Wang , Q. , and Sivakumar , K . On the privacy preserving properties of random data perturbation techniques. In ICDM , IEEE Computer Society , 2003 , pp. 99 -- 106 . Kargupta, H., Datta, S., Wang, Q., and Sivakumar, K. On the privacy preserving properties of random data perturbation techniques. In ICDM, IEEE Computer Society, 2003, pp. 99--106."},{"key":"e_1_3_2_1_15_1","volume-title":"Ling Lie. Towards Attack-Resilient Geometric Data Perturbation. In Proceedings of the 2007 SIAM International Conference on Data Mining","author":"Keke Chen","year":"2007","unstructured":"Keke Chen , Gordon Sun, and Ling Lie. Towards Attack-Resilient Geometric Data Perturbation. In Proceedings of the 2007 SIAM International Conference on Data Mining , April 2007 . Keke Chen, Gordon Sun, and Ling Lie. Towards Attack-Resilient Geometric Data Perturbation. In Proceedings of the 2007 SIAM International Conference on Data Mining, April 2007."},{"key":"e_1_3_2_1_16_1","series-title":"Advances in Database Systems","volume-title":"A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods. Privacy-Preserving Data Mining","author":"Kun Liu","year":"2008","unstructured":"Kun Liu , Chris Giannella, and Hillol Kargupta . A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods. Privacy-Preserving Data Mining , volume 34 of Advances in Database Systems , Springer , ( 2008 ). Kun Liu, Chris Giannella, and Hillol Kargupta. A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods. Privacy-Preserving Data Mining, volume 34 of Advances in Database Systems, Springer, (2008)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.353"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3979.4017"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.14"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.179"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-001027"},{"volume-title":"Ahmad Khadem Zadeh. A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms. Journal of software","author":"Mohammad Naderi Dehkordi","key":"e_1_3_2_1_25_1","unstructured":"Mohammad Naderi Dehkordi , Kambiz Badie , Ahmad Khadem Zadeh. A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms. Journal of software , vol. 4 , no. 6, August 2009. Mohammad Naderi Dehkordi, Kambiz Badie, Ahmad Khadem Zadeh. A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms. Journal of software, vol. 4, no. 6, August 2009."},{"key":"e_1_3_2_1_26_1","volume-title":"A Supermodularity Based Differential Privacy Preserving Algorithm for Data Anonymization","author":"Mohamed R.","year":"2014","unstructured":"Mohamed R. Fouad , Khaled Elbassioni. A Supermodularity Based Differential Privacy Preserving Algorithm for Data Anonymization . IEEE transaction on Knowledge and Data Engineering July 2014 . Mohamed R. Fouad, Khaled Elbassioni. A Supermodularity Based Differential Privacy Preserving Algorithm for Data Anonymization. IEEE transaction on Knowledge and Data Engineering July 2014."},{"key":"e_1_3_2_1_27_1","first-page":"83","article-title":"Privacy Preserving Data mining based on Ant Colony Optimization","volume":"0975","author":"Narmadha S","unstructured":"Narmadha , S . Privacy Preserving Data mining based on Ant Colony Optimization . International Journal of Computer Applications ( 0975-8887 ) Volume 83 -- No 8, December 2013. Narmadha, S. Privacy Preserving Data mining based on Ant Colony Optimization. International Journal of Computer Applications (0975-8887) Volume 83 -- No 8, December 2013.","journal-title":"International Journal of Computer Applications ("},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40343-9_9"},{"issue":"2","key":"e_1_3_2_1_29_1","article-title":"Privacy preserving in association rules using a genetic algorithm","volume":"22","author":"Rahat Ali SHAH","year":"2014","unstructured":"Rahat Ali SHAH , Sohail ASGHAR . Privacy preserving in association rules using a genetic algorithm . Turkish Journal of Electrical Engineering and Computer Sciences 22 ( 2 ). January 2014 . Rahat Ali SHAH, Sohail ASGHAR. Privacy preserving in association rules using a genetic algorithm. Turkish Journal of Electrical Engineering and Computer Sciences 22(2). January 2014.","journal-title":"Turkish Journal of Electrical Engineering and Computer Sciences"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287428"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014139"},{"key":"e_1_3_2_1_33_1","volume-title":"Zhengyi Li and Fangchun Yang. Differentially Private Frequent Itemset Mining via Transaction Splitting","author":"Sen Su","year":"2015","unstructured":"Sen Su , Shengzhi Xu, Xiang Cheng , Zhengyi Li and Fangchun Yang. Differentially Private Frequent Itemset Mining via Transaction Splitting . IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 7, JULY 2015 . Sen Su, Shengzhi Xu, Xiang Cheng, Zhengyi Li and Fangchun Yang. Differentially Private Frequent Itemset Mining via Transaction Splitting. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 7, JULY 2015."},{"key":"e_1_3_2_1_34_1","volume-title":"New improved algorithm for mining privacy---preserving frequent itemsets. Int J Comp Sci Inform 1:1--7","author":"Shrivastava R.","year":"2011","unstructured":"Shrivastava , R. , Awasthy , R. , Solanki , B. ( 2011 ). New improved algorithm for mining privacy---preserving frequent itemsets. Int J Comp Sci Inform 1:1--7 . Shrivastava, R., Awasthy, R., Solanki, B. (2011). New improved algorithm for mining privacy---preserving frequent itemsets. Int J Comp Sci Inform 1:1--7."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2435777"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_3_2_1_38_1","first-page":"33","article-title":"Association Rule Hiding using Artificial Bee Colony Algorithm","volume":"0975","author":"Vijayarani S.","unstructured":"Vijayarani , S. , Sathiya Prabha , M . Association Rule Hiding using Artificial Bee Colony Algorithm . International Journal of Computer Applications ( 0975-8887 ) Volume 33 -- No.2, November 2011. Vijayarani, S., Sathiya Prabha, M. Association Rule Hiding using Artificial Bee Colony Algorithm. International Journal of Computer Applications (0975-8887) Volume 33-- No.2, November 2011.","journal-title":"International Journal of Computer Applications ("},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1269668"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.12.005"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032649.1033461"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2008.180"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.11"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 12th International Workshop on Research Issues in Data Engineering","author":"Yucel Saygin","year":"2002","unstructured":"Yucel Saygin , Vassilios, S., Verykios , and Ahmed K . Elmagarmid, Privacy preserving association rule mining . In Proceedings of the 12th International Workshop on Research Issues in Data Engineering ( 2002 ). Yucel Saygin, Vassilios, S., Verykios, and Ahmed K. Elmagarmid, Privacy preserving association rule mining. In Proceedings of the 12th International Workshop on Research Issues in Data Engineering (2002)."}],"event":{"name":"KMO '16: The 11th International Knowledge Management in Organizations Conference","acronym":"KMO '16","location":"Hagen Germany"},"container-title":["Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2925995.2926005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2925995.2926005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:26Z","timestamp":1750273466000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2925995.2926005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,25]]},"references-count":45,"alternative-id":["10.1145\/2925995.2926005","10.1145\/2925995"],"URL":"https:\/\/doi.org\/10.1145\/2925995.2926005","relation":{},"subject":[],"published":{"date-parts":[[2016,7,25]]},"assertion":[{"value":"2016-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}