{"id":"https://openalex.org/W2772188150","doi":"https://doi.org/10.1145/3155133.3155150","title":"Applied Cuckoo Algorithm for Association Rule Hiding Problem","display_name":"Applied Cuckoo Algorithm for Association Rule Hiding Problem","publication_year":2017,"publication_date":"2017-12-07","ids":{"openalex":"https://openalex.org/W2772188150","doi":"https://doi.org/10.1145/3155133.3155150","mag":"2772188150"},"language":"en","primary_location":{"id":"doi:10.1145/3155133.3155150","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3155133.3155150","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth International Symposium on Information and Communication Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028121927","display_name":"Khue Doan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210101969","display_name":"Dalat University","ror":"https://ror.org/014cke235","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210101969"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Khue Doan","raw_affiliation_strings":["Department of Information Technology, University of DaLat, Da Lat, Viet Nam"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of DaLat, Da Lat, Viet Nam","institution_ids":["https://openalex.org/I4210101969"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112308441","display_name":"Minh Nguyen Quang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Minh Nguyen Quang","raw_affiliation_strings":["Academy of Cryptography Techniques, Ho Chi Minh, Viet Nam"],"affiliations":[{"raw_affiliation_string":"Academy of Cryptography Techniques, Ho Chi Minh, Viet Nam","institution_ids":["https://openalex.org/I4210155035"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057761132","display_name":"Bac Le","orcid":"https://orcid.org/0000-0002-4306-6945"},"institutions":[{"id":"https://openalex.org/I23582244","display_name":"Ho Chi Minh City University of Science","ror":"https://ror.org/05jfbgm49","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023","https://openalex.org/I23582244"]},{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Bac Le","raw_affiliation_strings":["Department of Computer Science, University of Science, VNU HCM, Ho Chi Minh, Viet Nam"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Science, VNU HCM, Ho Chi Minh, Viet Nam","institution_ids":["https://openalex.org/I23582244","https://openalex.org/I123565023"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028121927"],"corresponding_institution_ids":["https://openalex.org/I4210101969"],"apc_list":null,"apc_paid":null,"fwci":0.4836,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75618788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"31","issue":null,"first_page":"26","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12535","display_name":"Machine Learning and Data Classification","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/association-rule-learning","display_name":"Association rule learning","score":0.816521406173706},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8096802830696106},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.7457654476165771},{"id":"https://openalex.org/keywords/cuckoo-search","display_name":"Cuckoo search","score":0.7314245700836182},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7081074714660645},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.694663405418396},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.588214099407196},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.4876047670841217},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4863343834877014},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37023651599884033},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3313191533088684},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3118276596069336},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13744717836380005},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08145895600318909}],"concepts":[{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.816521406173706},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8096802830696106},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.7457654476165771},{"id":"https://openalex.org/C117241572","wikidata":"https://www.wikidata.org/wiki/Q5192379","display_name":"Cuckoo search","level":3,"score":0.7314245700836182},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7081074714660645},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.694663405418396},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.588214099407196},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.4876047670841217},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4863343834877014},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37023651599884033},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3313191533088684},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3118276596069336},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13744717836380005},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08145895600318909},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3155133.3155150","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3155133.3155150","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth International Symposium on Information and Communication Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","score":0.5400000214576721,"display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1608877012","https://openalex.org/W1976744965","https://openalex.org/W1986196603","https://openalex.org/W2007898191","https://openalex.org/W2028637103","https://openalex.org/W2041398293","https://openalex.org/W2047602785","https://openalex.org/W2095576022","https://openalex.org/W2103759282","https://openalex.org/W2105564121","https://openalex.org/W2114209264","https://openalex.org/W2115074748","https://openalex.org/W2116180864","https://openalex.org/W2123108022","https://openalex.org/W2135239779","https://openalex.org/W2137344466","https://openalex.org/W2162479262","https://openalex.org/W2187012544","https://openalex.org/W2505532505"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Nowadays,":[0],"the":[1,10,31,48,60,65,77,81,85,105,112,125,130,133,141,149,158],"database":[2],"security":[3],"problem":[4],"is":[5,36,54,62,98],"becoming":[6,55],"significantly":[7],"interesting":[8],"in":[9,29,39,64,155],"data":[11,18],"mining":[12,42],"field.":[13],"How":[14],"can":[15],"exploit":[16],"legitimate":[17],"and":[19],"avoid":[20],"disclosing":[21],"sensitive":[22,45],"information.":[23],"There":[24],"have":[25],"been":[26],"many":[27],"approaches":[28],"which":[30],"outstanding":[32],"solution":[33],"among":[34],"them":[35],"privacy":[37],"preservation":[38],"association":[40],"rule":[41],"to":[43,79,103,157],"hide":[44],"rules.":[46],"In":[47,70],"recent":[49],"years,":[50],"a":[51,99],"meta-heuristic":[52],"algorithm":[53,61,68],"effective":[56],"for":[57,111],"this":[58,71,96],"goal,":[59],"applied":[63],"cuckoo":[66],"optimization":[67],"(COA4ARH).":[69],"paper,":[72],"an":[73,116],"improved":[74,150],"proposal":[75],"of":[76,84,95,108,114,121,132],"COA4ARH":[78],"minimize":[80],"side":[82],"effect":[83],"missing":[86],"non-sensitive":[87],"rules":[88],"will":[89],"be":[90],"introduced.":[91],"The":[92,144],"main":[93],"contribution":[94],"study":[97],"new":[100],"pre-process":[101],"stage":[102],"determine":[104],"minimum":[106],"number":[107],"necessary":[109],"transactions":[110],"process":[113],"initializing":[115],"initial":[117],"habitat,":[118],"thus":[119],"restriction":[120],"modified":[122],"operation":[123],"on":[124,140],"original":[126,159],"data.":[127],"To":[128],"evaluate":[129],"effectiveness":[131],"proposed":[134],"method,":[135],"we":[136],"conducted":[137],"several":[138],"experiments":[139],"real":[142],"datasets.":[143],"experimental":[145],"results":[146],"show":[147],"that":[148],"approach":[151],"has":[152],"higher":[153],"performance":[154],"compared":[156],"algorithm.":[160]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
