{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:35Z","timestamp":1750306295403,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,15]],"date-time":"2016-08-15T00:00:00Z","timestamp":1471219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61503092"],"award-info":[{"award-number":["61503092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,15]]},"DOI":"10.1145\/2955129.2955136","type":"proceedings-article","created":{"date-parts":[[2016,7,18]],"date-time":"2016-07-18T12:53:14Z","timestamp":1468846394000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Anonymous System for Transaction Data"],"prefix":"10.1145","author":[{"given":"Jerry Chun-Wei","family":"Lin","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen Graduate School, Shenzhen, China"}]},{"given":"Qiankun","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen Graduate School, Shenzhen, China"}]},{"given":"Philippe","family":"Fournier-Viger","sequence":"additional","affiliation":[{"name":"School of Natural Sciences and Humanities, Harbin Institute of Technology, Shenzhen Graduate School, Shenzhen, China"}]},{"given":"Tzung-Pei","family":"Hong","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Information Engineering, National University of Kaohsiung, Kaohsiung, Taiwan, Dept. of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan"}]},{"given":"Justin","family":"Zhan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Nevada, Las Vegas, USA"}]},{"given":"Miroslav","family":"Voznak","sequence":"additional","affiliation":[{"name":"Department of Telecommunications, VSB-Technical University of Ostrava, Czech Republic"}]}],"member":"320","published-online":{"date-parts":[[2016,8,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Frequent itemset mining dataset repository. 2012. http:\/\/fimi.ua.ac.be\/data.  Frequent itemset mining dataset repository. 2012. http:\/\/fimi.ua.ac.be\/data."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.05.003"},{"volume-title":"IBM Almaden Research Center","year":"1994","author":"Agrawal R.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714590"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.101"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497480"},{"key":"e_1_3_2_1_7_1","first-page":"1953","article-title":"Pulse code communication","volume":"2632058","author":"Gray F.","journal-title":"U.S. Patent"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0346-1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-012-0377-5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.74"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.05.011"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.91"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0590-5"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"C. W. Lin B. Zhang K. T. Yang and T. P. Hong. Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. The Scientific World Journal Article ID 398269:13 pages 2014.  C. W. Lin B. Zhang K. T. Yang and T. P. Hong. Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. The Scientific World Journal Article ID 398269:13 pages 2014.","DOI":"10.1155\/2014\/398269"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_23"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453874"},{"issue":"12","key":"e_1_3_2_1_22_1","first-page":"6849","article-title":"Extending suppression for anonymization on set-valued data. International Journal of Innovative Computing","volume":"7","author":"Wang S. L.","year":"2011","journal-title":"Information and Control"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0554-9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0674-2"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150504"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401982"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339696"}],"event":{"name":"MISNC, SI, DS 2016: The 3rd Multidisciplinary International Social Networks Conference, SocialInformatics 2016, Data Science 2016","sponsor":["Facebook Facebook"],"location":"Union NJ USA","acronym":"MISNC, SI, DS 2016"},"container-title":["Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2955129.2955136","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2955129.2955136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:11Z","timestamp":1750221551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2955129.2955136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,15]]},"references-count":27,"alternative-id":["10.1145\/2955129.2955136","10.1145\/2955129"],"URL":"https:\/\/doi.org\/10.1145\/2955129.2955136","relation":{},"subject":[],"published":{"date-parts":[[2016,8,15]]},"assertion":[{"value":"2016-08-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}