{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:25:59Z","timestamp":1725999959438},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030042714"},{"type":"electronic","value":"9783030042721"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04272-1_8","type":"book-chapter","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T01:02:36Z","timestamp":1542589356000},"page":"120-136","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["How Reliable Is Your Outsourcing Service for Data Mining? A Metamorphic Method for Verifying the Result Integrity"],"prefix":"10.1007","author":[{"given":"Jiewei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaoyuan","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Zhiyi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,20]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imieli\u0144ski, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, vol. 22, pp. 207\u2013216. ACM (1993)","DOI":"10.1145\/170036.170072"},{"issue":"1","key":"8_CR2","first-page":"307","volume":"12","author":"R Agrawal","year":"1996","unstructured":"Agrawal, R., Mannila, H., Srikant, R., Toivonen, H., Verkamo, A.I., et al.: Fast discovery of association rules. Adv. Knowl. Discov. Data Min. 12(1), 307\u2013328 (1996)","journal-title":"Adv. Knowl. Discov. Data Min."},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1016\/j.asoc.2017.11.013","volume":"62","author":"J Alwidian","year":"2018","unstructured":"Alwidian, J., Hammo, B.H., Obeid, N.: WCBA: weighted classification based on association rules algorithm for breast cancer disease. Appl. Soft Comput. 62, 536\u2013549 (2018)","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"2331","DOI":"10.1007\/s11277-016-3451-1","volume":"94","author":"R Aravindhan","year":"2017","unstructured":"Aravindhan, R., Shanmugalakshmi, R., Ramya, K.: Circumvention of nascent and potential Wi-Fi phishing threat using association rule mining. Wirel. Pers. Commun. 94(4), 2331\u20132361 (2017)","journal-title":"Wirel. Pers. Commun."},{"issue":"5","key":"8_CR5","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TSE.2014.2372785","volume":"41","author":"ET Barr","year":"2015","unstructured":"Barr, E.T., Harman, M., McMinn, P., Shahbaz, M., Yoo, S.: The oracle problem in software testing: a survey. IEEE Trans. Softw. Eng. 41(5), 507\u2013525 (2015)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"8_CR6","volume-title":"Data Mining Techniques: For Marketing, Sales, and Customer Support","author":"MJ Berry","year":"1997","unstructured":"Berry, M.J., Linoff, G.: Data Mining Techniques: For Marketing, Sales, and Customer Support. Wiley, Hoboken (1997)"},{"key":"8_CR7","unstructured":"Borgelt, C.: Efficient implementations of Apriori and Eclat. In: 2003 Proceedings of the IEEE ICDM Workshop on Frequent Itemset Mining Implementations (2003)"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.4018\/jwsr.2007040103","volume":"4","author":"WK Chan","year":"2007","unstructured":"Chan, W.K., Cheung, S.C., Leung, K.R.: A metamorphic testing approach for online testing of service-oriented software applications. Int. J. Web Serv. Res. 4(2), 61\u201381 (2007)","journal-title":"Int. J. Web Serv. Res."},{"key":"8_CR9","unstructured":"Chen, T.Y., Cheung, S.C., Yiu, S.M.: Metamorphic testing: a new approach for generating next test cases. Technical report, Technical Report HKUST-CS98-01, Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong (1998)"},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1186\/1471-2105-10-24","volume":"10","author":"TY Chen","year":"2009","unstructured":"Chen, T.Y., Ho, J.W., Liu, H., Xie, X.: An innovative approach for testing bioinformatics programs using metamorphic testing. BMC Bioinformatics 10(1), 24 (2009)","journal-title":"BMC Bioinformatics"},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TSC.2015.2436387","volume":"9","author":"B Dong","year":"2016","unstructured":"Dong, B., Liu, R., Wang, H.W.: Trust-but-verify: verifying result correctness of outsourced frequent itemset mining in data-mining-as-a-service paradigm. IEEE Trans. Serv. Comput. 9(1), 18\u201332 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"8_CR12","unstructured":"Fournier-Viger, P., Gomariz, A., Gueniche, T., Soltani, A., Wu., C., Tseng, V.S.: SPMF: a Java open-source pattern mining library (2016). \n http:\/\/www.philippe-fournier-viger.com\/spmf\/"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, vol. 29, pp. 1\u201312. ACM (2000)","DOI":"10.1145\/335191.335372"},{"issue":"1","key":"8_CR14","first-page":"71","volume":"32","author":"S Kotsiantis","year":"2006","unstructured":"Kotsiantis, S., Kanellopoulos, D.: Association rules mining: a recent overview. GESTS Int. Trans. Comput. Sci. Eng. 32(1), 71\u201382 (2006)","journal-title":"GESTS Int. Trans. Comput. Sci. Eng."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Kuo, F.C., Chen, T.Y., Tam, W.K.: Testing embedded software by metamorphic testing: a wireless metering system case study. In: 2011 Proceedings of IEEE 36th Conference on Local Computer Networks, pp. 291\u2013294. IEEE (2011)","DOI":"10.1109\/LCN.2011.6115306"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.L.: Verifying completeness of relational query results in data publishing. In: 2005 Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 407\u2013418. ACM (2005)","DOI":"10.1145\/1066157.1066204"},{"issue":"2","key":"8_CR17","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s10664-017-9560-y","volume":"23","author":"T Rolfsnes","year":"2018","unstructured":"Rolfsnes, T., Moonen, L., Di Alesio, S., Behjati, R., Binkley, D.: Aggregating association rules to improve change recommendation. Empir. Softw. Eng. 23(2), 987\u20131035 (2018)","journal-title":"Empir. Softw. Eng."},{"issue":"4","key":"8_CR18","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1093\/comjnl\/25.4.465","volume":"25","author":"EJ Weyuker","year":"1982","unstructured":"Weyuker, E.J.: On testing non-testable programs. Comput. J. 25(4), 465\u2013470 (1982)","journal-title":"Comput. J."},{"issue":"1","key":"8_CR19","first-page":"1162","volume":"2","author":"WK Wong","year":"2009","unstructured":"Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: An audit environment for outsourcing of frequent itemset mining. PVLDB 2(1), 1162\u20131173 (2009)","journal-title":"PVLDB"},{"key":"8_CR20","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: 2007 Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 782\u2013793. VLDB Endowment (2007)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Xie, X., Ho, J., Murphy, C., Kaiser, G., Xu, B., Chen, T.Y.: Application of metamorphic testing to supervised classifiers. In: 2009 Proceedings of the Ninth International Conference on Quality Software, pp. 135\u2013144. IEEE (2009)","DOI":"10.1109\/QSIC.2009.26"},{"issue":"4","key":"8_CR22","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.jss.2010.11.920","volume":"84","author":"X Xie","year":"2011","unstructured":"Xie, X., Ho, J.W., Murphy, C., Kaiser, G., Xu, B., Chen, T.Y.: Testing and validating machine learning classifiers by metamorphic testing. J. Syst. Softw. 84(4), 544\u2013558 (2011)","journal-title":"J. Syst. Softw."},{"key":"8_CR23","unstructured":"Zaki, M.J., Parthasarathy, S., Ogihara, M., Li, W., et al.: New algorithms for fast discovery of association rules. In: 1997 Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, vol. 97, pp. 283\u2013286 (1997)"}],"container-title":["Lecture Notes in Computer Science","Software Analysis, Testing, and Evolution"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04272-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T05:13:18Z","timestamp":1558329198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04272-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030042714","9783030042721"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04272-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SATE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Analysis, Testing, and Evolution","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzheng","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"satev2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/xiongyingfei.github.io\/confs\/sate18\/index_en.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}