SL Wang, YC Tsai,
HY Kao… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
K-anonymity-based techniques [9],[11],[15]-[17] have been the main anonymization
techniques on relational data ad transactional data to protect privacy against re-identification …