{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:16Z","timestamp":1750306096491,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T00:00:00Z","timestamp":1512604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12,7]]},"DOI":"10.1145\/3155133.3155150","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T13:26:53Z","timestamp":1512998813000},"page":"26-33","source":"Crossref","is-referenced-by-count":1,"title":["Applied Cuckoo Algorithm for Association Rule Hiding Problem"],"prefix":"10.1145","author":[{"given":"Khue","family":"Doan","sequence":"first","affiliation":[{"name":"Department of Information Technology, University of DaLat, Da Lat, Viet Nam"}]},{"given":"Minh Nguyen","family":"Quang","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques, Ho Chi Minh, Viet Nam"}]},{"given":"Bac","family":"Le","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Science, VNU HCM, Ho Chi Minh, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"45","volume-title":"Proceedings of the 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX)","author":"Atallah E.","year":"1999"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.08.005"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Peng Cheng John F. Roddick Shu-Chuan Chu Chun-Wei Lin (2015). \"Privacy preservation through a greedy distortion-based rule-hiding method\" Springer Science & Business Media New York.  Peng Cheng John F. Roddick Shu-Chuan Chu Chun-Wei Lin (2015). \"Privacy preservation through a greedy distortion-based rule-hiding method\" Springer Science & Business Media New York.","DOI":"10.1007\/s10489-015-0671-0"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.11"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/951949.952071"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2006.009135"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5626\/JCSE.2007.1.1.074"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183721"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-008-0178-7"},{"key":"e_1_3_2_1_11_1","first-page":"210","volume-title":"Nature & biologically inspired computing","author":"Yang X.-S.","year":"2009"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.05.008"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1269668"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.4.6.555-562"},{"key":"e_1_3_2_1_15_1","first-page":"2087","article-title":"Improved genetic algorithm approach for sensitive association rules hiding","volume":"31","author":"Khan A","year":"2014","journal-title":"World Applied Sciences Journal"},{"key":"e_1_3_2_1_16_1","first-page":"43","volume-title":"IEEE 2002 ICDM workshop on privacy, security and data mining","volume":"14","author":"Oliveira S. R.","year":"2002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0056"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0603"},{"key":"e_1_3_2_1_19_1","first-page":"29","article-title":"Association Rule Hiding for Data Mining","volume":"41","author":"Aris Gkoulalas-Divanis S.","year":"2010","journal-title":"Advances in Database Systems"}],"event":{"name":"SoICT 2017: The Eighth International Symposium on Information and Communication Technology","sponsor":["SOICT School of Information and Communication Technology - HUST","NAFOSTED The National Foundation for Science and Technology Development"],"location":"Nha Trang City Viet Nam","acronym":"SoICT 2017"},"container-title":["Proceedings of the Eighth International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155150","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3155133.3155150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:28Z","timestamp":1750217428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,7]]},"references-count":19,"alternative-id":["10.1145\/3155133.3155150","10.1145\/3155133"],"URL":"https:\/\/doi.org\/10.1145\/3155133.3155150","relation":{},"subject":[],"published":{"date-parts":[[2017,12,7]]}}}