{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:34:01Z","timestamp":1770222841175,"version":"3.49.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T00:00:00Z","timestamp":1622592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61976126"],"award-info":[{"award-number":["61976126"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,6,23]]},"abstract":"<jats:p>During the past several years, revealing some useful knowledge or protecting individual\u2019s private information in an identifiable health dataset (i.e., within an Electronic Health Record) has become a tradeoff issue. Especially in this era of a global pandemic, security and privacy are often overlooked in lieu of usability. Privacy preserving data mining (PPDM) is definitely going to be have an important role to resolve this problem. Nevertheless, the scenario of mining information in an identifiable health dataset holds high complexity compared to traditional PPDM problems. Leaking individual private information in an identifiable health dataset has becomes a serious legal issue. In this article, the proposed Ant Colony System to Data Mining algorithm takes the multi-threshold constraint to secure and sanitize patents\u2019 records in different lengths, which is applicable in a real medical situation. The experimental results show the proposed algorithm not only has the ability to hide all sensitive information but also to keep useful knowledge for mining usage in the sanitized database.<\/jats:p>","DOI":"10.1145\/3408296","type":"journal-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T02:47:39Z","timestamp":1622688459000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3740-2102","authenticated-orcid":false,"given":"Jimmy Ming-Tai","family":"Wu","sequence":"first","affiliation":[{"name":"Shandong University of Science and Technology, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9851-4103","authenticated-orcid":false,"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Brandon University, Canada and China Medical University, Taichung, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8768-9709","authenticated-orcid":false,"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Western Norway University of Applied Sciences, Bergen, Norway"}]},{"given":"Qian","family":"Teng","sequence":"additional","affiliation":[{"name":"Shandong University of Science and Technology, Qingdao, Shandong, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2300846"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/645920.672836"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/519168.788219"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2617382"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2892753.2892999"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731877"},{"key":"e_1_2_1_8_1","unstructured":"Example database foodmart of Microsoft analysis services. [n.d.]. Retrieved from http:\/\/msdn. microsoft.com\/en-us\/library\/aa217032(SQL.80).aspx. Example database foodmart of Microsoft analysis services. [n.d.]. Retrieved from http:\/\/msdn. microsoft.com\/en-us\/library\/aa217032(SQL.80).aspx."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.01.023"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585892"},{"key":"e_1_2_1_11_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. Retrieved from http:\/\/archive.ics.uci.edu\/ml. Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. Retrieved from http:\/\/archive.ics.uci.edu\/ml."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2012.12.003"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2942594"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314107"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","first-page":"e1216","DOI":"10.1002\/widm.1216","article-title":"Data mining in distributed environment: A survey","volume":"7","author":"Gan Wensheng","year":"2017","unstructured":"Wensheng Gan , Jerry Chun Wei Lin , Han Chieh Chao , and Justin Zhan . 2017 . Data mining in distributed environment: A survey . Data Min. Knowl. Discov. 7 , 6 (2017), e1216 . Wensheng Gan, Jerry Chun Wei Lin, Han Chieh Chao, and Justin Zhan. 2017. Data mining in distributed environment: A survey. Data Min. Knowl. Discov. 7, 6 (2017), e1216.","journal-title":"Data Min. Knowl. Discov."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1242"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2391952.2392002"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3057729"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/531075"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-012-0377-5"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.05.011"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the IEEE International Conference on Neural Networks","volume":"4","author":"Kenndy James","year":"1942","unstructured":"James Kenndy and R. C. Eberhart . 1995. Particle swarm optimization . In Proceedings of the IEEE International Conference on Neural Networks , Vol. 4 . 1942 \u20131948. James Kenndy and R. C. Eberhart. 1995. Particle swarm optimization. In Proceedings of the IEEE International Conference on Neural Networks, Vol. 4. 1942\u20131948."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1997.637339"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.007"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.03.014"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0590-5"},{"key":"e_1_2_1_28_1","volume-title":"Kuo Tung Yang, and Tzung Pei Hong","author":"Lin Chun Wei","year":"2014","unstructured":"Chun Wei Lin , Binbin Zhang , Kuo Tung Yang, and Tzung Pei Hong . 2014 . Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci. World J. 2014 (2014). Chun Wei Lin, Binbin Zhang, Kuo Tung Yang, and Tzung Pei Hong. 2014. Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms. Sci. World J. 2014 (2014)."},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the International Conference on Data Mining Workshops. 1459\u20131463","author":"Wei Lin Jerry Chun","year":"2018","unstructured":"Jerry Chun Wei Lin , Philippe Fournier-Viger , Lintai Wu , Wensheng Gan , Youcef Djenouri , and Ji Zhang . 2018 . PPSF: An open-source privacy-preserving and security mining framework . In Proceedings of the International Conference on Data Mining Workshops. 1459\u20131463 . Jerry Chun Wei Lin, Philippe Fournier-Viger, Lintai Wu, Wensheng Gan, Youcef Djenouri, and Ji Zhang. 2018. PPSF: An open-source privacy-preserving and security mining framework. In Proceedings of the International Conference on Data Mining Workshops. 1459\u20131463."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.03.007"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899831"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.10.010"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03829-3"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.022"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/850782.850789"},{"key":"e_1_2_1_36_1","unstructured":"IBM quest synthetic data generator. [n.d.]. Retrieved from https:\/\/sourceforge.net\/projects\/ibmquestdatagen\/. IBM quest synthetic data generator. [n.d.]. Retrieved from https:\/\/sourceforge.net\/projects\/ibmquestdatagen\/."},{"key":"e_1_2_1_37_1","unstructured":"Frequent Itemset Mining Dataset Repository. [n.d.]. Retrieved from http:\/\/fimi.ua.ac.be\/data\/. Frequent Itemset Mining Dataset Repository. [n.d.]. Retrieved from http:\/\/fimi.ua.ac.be\/data\/."},{"key":"e_1_2_1_38_1","unstructured":"G. Srivastava J. C. Lin M. Pirouz Y. Li and U. Yun. 2020. A pre-large weighted-fusion system of sensed high-utility patterns. IEEE Sens. J. (2020) 1\u20131. G. Srivastava J. C. Lin M. Pirouz Y. Li and U. Yun. 2020. A pre-large weighted-fusion system of sensed high-utility patterns. IEEE Sens. J. (2020) 1\u20131."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"e_1_2_1_40_1","first-page":"1718","article-title":"A sanitization approach to secure shared data in an IoT environment","volume":"16","author":"Tai Wu Jimmy Ming","year":"2019","unstructured":"Jimmy Ming Tai Wu , Jerry Chun Wei Lin , Philippe Fournier-Viger , Youcef Djenouri , Chun Hao Chen , and Zhongcui Li . 2019 . A sanitization approach to secure shared data in an IoT environment . Math. Biosci. Eng. 16 (2019), 1718 \u2013 1728 . Jimmy Ming Tai Wu, Jerry Chun Wei Lin, Philippe Fournier-Viger, Youcef Djenouri, Chun Hao Chen, and Zhongcui Li. 2019. A sanitization approach to secure shared data in an IoT environment. Math. Biosci. Eng. 16 (2019), 1718\u20131728.","journal-title":"Math. Biosci. Eng."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2702281"},{"key":"e_1_2_1_42_1","first-page":"1","article-title":"A grid-based swarm intelligence algorithm for privacy-preserving data mining","volume":"9","author":"Wu Tsu Yang","year":"2019","unstructured":"Tsu Yang Wu , Jerry Chun Wei Lin Lin , Yuyu Zhang , and Chun Hao Chen . 2019 . A grid-based swarm intelligence algorithm for privacy-preserving data mining . Appl. Intell. 9 (2019), 1 \u2013 20 . Tsu Yang Wu, Jerry Chun Wei Lin Lin, Yuyu Zhang, and Chun Hao Chen. 2019. A grid-based swarm intelligence algorithm for privacy-preserving data mining. Appl. Intell. 9 (2019), 1\u201320.","journal-title":"Appl. Intell."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.06.004"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2535728"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the Canadian AI Conference. 64\u201370","author":"Zaman A. N. K.","unstructured":"A. N. K. Zaman , Charlie Obimbo , and Rozita A. Dara . 2017. An improved data sanitization algorithm for privacy preserving medical data publishing . In Proceedings of the Canadian AI Conference. 64\u201370 . A. N. K. Zaman, Charlie Obimbo, and Rozita A. Dara. 2017. An improved data sanitization algorithm for privacy preserving medical data publishing. In Proceedings of the Canadian AI Conference. 64\u201370."}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3408296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:39:02Z","timestamp":1750199942000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,2]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6,23]]}},"alternative-id":["10.1145\/3408296"],"URL":"https:\/\/doi.org\/10.1145\/3408296","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,2]]},"assertion":[{"value":"2020-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}