The following publications are possibly variants of this publication:
- On anonymizing transactions with sensitive itemsShyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong. apin, 41(4):1043-1058, 2014. [doi]
- Flexible sensitive K-anonymization on transactionsYu-Chuan Tsai, Shyue-Liang Wang, I-Hsien Ting, Tzung-Pei Hong. www, 23(4):2391-2406, 2020. [doi]
- k-symmetry model for identity anonymization in social networksWentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zhihui Wang. edbt 2010: 111-122 [doi]
- Interactive anonymization of sensitive dataXiaokui Xiao, Guozhang Wang, Johannes Gehrke. SIGMOD 2009: 1051-1054 [doi]
- Clustering Transactions Using Large ItemsKe Wang, Chu Xu, Bing Liu. CIKM 1999: 483-490 [doi]