{"id":"https://openalex.org/W4402626833","doi":"https://doi.org/10.1109/tmc.2024.3464744","title":"Secure Two-Party Frequent Itemset Mining With Guaranteeing Differential Privacy","display_name":"Secure Two-Party Frequent Itemset Mining With Guaranteeing Differential Privacy","publication_year":2024,"publication_date":"2024-09-19","ids":{"openalex":"https://openalex.org/W4402626833","doi":"https://doi.org/10.1109/tmc.2024.3464744"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2024.3464744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3464744","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082616985","display_name":"Wenjie Chen","orcid":"https://orcid.org/0000-0002-9020-129X"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenjie Chen","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100763972","display_name":"Haoyu Chen","orcid":"https://orcid.org/0000-0002-3744-7290"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyu Chen","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101197266","display_name":"Tingxuan Han","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tingxuan Han","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021538603","display_name":"Wei Tong","orcid":"https://orcid.org/0000-0002-8427-6068"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Tong","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060268538","display_name":"Sheng Zhong","orcid":"https://orcid.org/0000-0002-6581-8730"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Zhong","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082616985"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":3.8971,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.94322002,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"24","issue":"1","first_page":"276","last_page":"292"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.963100016117096,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11063","display_name":"Rough Sets and Fuzzy Logic","score":0.9017000198364258,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8050159215927124},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7666524648666382},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.565392255783081},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42352694272994995},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.41404759883880615},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4126741588115692},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3926142454147339},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3480307459831238},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.31211525201797485}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8050159215927124},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7666524648666382},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.565392255783081},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42352694272994995},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.41404759883880615},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4126741588115692},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3926142454147339},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3480307459831238},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31211525201797485}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2024.3464744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3464744","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W1557833142","https://openalex.org/W1866535025","https://openalex.org/W1873763122","https://openalex.org/W1969009977","https://openalex.org/W1973056687","https://openalex.org/W1981029888","https://openalex.org/W2020025931","https://openalex.org/W2027595342","https://openalex.org/W2043417095","https://openalex.org/W2043944888","https://openalex.org/W2043969662","https://openalex.org/W2069870183","https://openalex.org/W2071702404","https://openalex.org/W2074418712","https://openalex.org/W2091644709","https://openalex.org/W2093281079","https://openalex.org/W2110953678","https://openalex.org/W2112022568","https://openalex.org/W2119506752","https://openalex.org/W2123820077","https://openalex.org/W2138865266","https://openalex.org/W2141420453","https://openalex.org/W2164778205","https://openalex.org/W2219888463","https://openalex.org/W2233233025","https://openalex.org/W2293339990","https://openalex.org/W2345464210","https://openalex.org/W2437087128","https://openalex.org/W2532967691","https://openalex.org/W2616666333","https://openalex.org/W2783821034","https://openalex.org/W2794674331","https://openalex.org/W2800098042","https://openalex.org/W2890248913","https://openalex.org/W2963506795","https://openalex.org/W2983838566","https://openalex.org/W3082420143","https://openalex.org/W3097942339","https://openalex.org/W3193998172","https://openalex.org/W3213827288","https://openalex.org/W4229004754","https://openalex.org/W4237639947","https://openalex.org/W4252403066","https://openalex.org/W4283215441","https://openalex.org/W4387544194","https://openalex.org/W6603698748","https://openalex.org/W6628750762","https://openalex.org/W6630198464","https://openalex.org/W6682866549","https://openalex.org/W6760226272","https://openalex.org/W6762533435","https://openalex.org/W6767941664","https://openalex.org/W6783527074","https://openalex.org/W6795937011","https://openalex.org/W6810138691","https://openalex.org/W6810609255","https://openalex.org/W6843004019"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W2116878667","https://openalex.org/W4396832952","https://openalex.org/W3013058036","https://openalex.org/W3015944045","https://openalex.org/W4225340788","https://openalex.org/W1591172238","https://openalex.org/W2951971312","https://openalex.org/W2972172135","https://openalex.org/W4300474583"],"abstract_inverted_index":{"Frequent":[0],"itemset":[1,21,57,102,135,177],"mining":[2,103],"is":[3,12,41],"an":[4],"essential":[5],"task":[6],"in":[7,83,157],"data":[8,25,29,39,46,85,110],"analysis.":[9,26],"Therefore,":[10],"it":[11],"crucial":[13],"to":[14,43,73,88,95,114,165],"design":[15],"practical":[16,141],"methods":[17],"for":[18,99,121,174],"privacy-preserving":[19],"frequent":[20,56,101,134,148,176],"mining,":[22,58],"enabling":[23],"private":[24,132,160],"For":[27],"two-party":[28,55,100,133],"analysis":[30,86],"tasks,":[31],"each":[32,108],"party":[33],"possesses":[34],"its":[35],"portion":[36],"of":[37,61,130,150,153],"the":[38,45,48,59,69,75,115,123,128,147,151,163,187,191],"and":[40,186],"reluctant":[42],"share":[44],"with":[47,198],"other.":[49],"While":[50],"secure":[51],"computation":[52],"can":[53,144,194],"enable":[54],"output":[60],"exact":[62],"top-<inline-formula><tex-math":[63],"notation=\"LaTeX\">$k$</tex-math></inline-formula>":[64],"itemsets":[65],"may":[66],"still":[67],"leave":[68],"adversary":[70],"a":[71,140,158],"chance":[72],"infer":[74],"sensitive":[76],"information.":[77],"Differential":[78],"privacy":[79,98,120],"has":[80],"been":[81],"utilized":[82],"various":[84],"tasks":[87],"safeguard":[89],"participating":[90],"individuals.":[91],"However,":[92],"addressing":[93],"how":[94],"ensure":[96],"differential":[97,119],"remains":[104],"unexplored.":[105],"To":[106],"prevent":[107],"party\u2019s":[109],"from":[111],"being":[112],"leaked":[113],"other":[116],"while":[117],"achieving":[118],"releasing":[122],"output,":[124],"this":[125,172],"paper":[126],"investigates":[127],"problem":[129],"differentially":[131,159],"mining.":[136,178],"We":[137],"first":[138],"propose":[139],"method":[142,193],"that":[143,190],"efficiently":[145],"select":[146],"items":[149],"union":[152],"two":[154],"confidential":[155],"databases":[156],"way":[161],"without":[162],"need":[164],"combine":[166],"all":[167],"elements.":[168],"Then":[169],"we":[170],"extend":[171],"technique":[173],"general":[175],"Extensive":[179],"experiments":[180],"were":[181],"conducted":[182],"on":[183],"real-world":[184],"datasets,":[185],"results":[188],"show":[189],"proposed":[192],"achieve":[195],"satisfactory":[196],"utility":[197],"affordable":[199],"overheads.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
