{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:22:33Z","timestamp":1769296953134,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540332060","type":"print"},{"value":"9783540332077","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11731139_74","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T04:03:44Z","timestamp":1141877024000},"page":"647-656","source":"Crossref","is-referenced-by-count":124,"title":["Privacy-Preserving SVM Classification on Vertically Partitioned Data"],"prefix":"10.1007","author":[{"given":"Hwanjo","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Xiaoqian","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"74_CR1","unstructured":"Standard for privacy of individually identifiable health information. Federal Register\u00a066(40) (Febraury 28 2001)"},{"key":"74_CR2","volume-title":"Statistical Learning Theory","author":"V.N. Vapnik","year":"1998","unstructured":"Vapnik, V.N.: Statistical Learning Theory. John Wiley and Sons, Chichester (1998)"},{"key":"74_CR3","doi-asserted-by":"crossref","unstructured":"Fung, G., Mangasarian, O.L.: Proximal support vector machine classifiers. In: Proc. ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, KDD 2001 (2001)","DOI":"10.1145\/502512.502527"},{"key":"74_CR4","unstructured":"Sweeney, L., Shamos, M.: A multiparty computation for randomly ordering players and making random selections. Tech. Rep. CMU-ISRI-04-126, Carnegie Mellon University (2004)"},{"key":"74_CR5","unstructured":"Yu, H., Vaidya, J.: Secure matrix addition. Tech. Rep., UIOWA Technical Report UIOWA-CS-04-04 (2004), http:\/\/hwanjoyu.org\/paper\/techreport04-04.pdf"},{"key":"74_CR6","first-page":"162","volume-title":"Proceedings of the 27th IEEE Symposium on Foundations of Computer Science","author":"A.C. Yao","year":"1986","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162\u2013167. IEEE, Los Alamitos (1986)"},{"key":"74_CR7","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: ACM Symp. on the Theory of Computing (1987)","DOI":"10.1145\/28395.28420"},{"key":"74_CR8","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD Conference on Management of Data (2000)","DOI":"10.1145\/342009.335438"},{"key":"74_CR9","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the Third IEEE International Conference on Data Mining, ICDM 2003 (2003)","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"74_CR10","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proc. of ACM SIGMOD Int. Conf. Management of data (2005)","DOI":"10.1145\/1066157.1066163"},{"issue":"3","key":"74_CR11","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y. Lindell","year":"2002","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology\u00a015(3), 177\u2013206 (2002)","journal-title":"Journal of Cryptology"},{"issue":"1","key":"74_CR12","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"V.S. Verykios","year":"2004","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Record\u00a033(1), 50\u201357 (2004)","journal-title":"SIGMOD Record"},{"key":"74_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-540-24741-8_12","volume-title":"Advances in Database Technology - EDBT 2004","author":"C.C. Aggarwal","year":"2004","unstructured":"Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 183\u2013199. Springer, Heidelberg (2004)"},{"key":"74_CR14","unstructured":"Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving clustering by data transformation. In: SBBD 2004 (2004)"},{"key":"74_CR15","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. Journal of Computer Security (to appear)","DOI":"10.3233\/JCS-2005-13401"},{"key":"74_CR16","doi-asserted-by":"crossref","unstructured":"Lin, X., Clifton, C., Zhu, M.: Privacy preserving clustering with distributed EM mixture modeling. Knowledge and Information Systems (to appear 2004)","DOI":"10.1007\/s10115-004-0148-7"},{"key":"74_CR17","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (2003)","DOI":"10.1145\/956750.956776"},{"key":"74_CR18","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy preserving na\u0131ve bayes classifier for vertically partitioned data. In: 2004 SIAM International Conference on Data Mining (2004)","DOI":"10.1137\/1.9781611972740.59"},{"key":"74_CR19","doi-asserted-by":"crossref","unstructured":"Karr, A.F., Lin, X., Sanil, A.P., Reiter, J.P.: Secure regressions on distributed databases. Journal of Computational and Graphical Statistics (2005)","DOI":"10.1198\/106186005X47714"},{"key":"74_CR20","doi-asserted-by":"crossref","unstructured":"Sanil, A.P., Karr, A.F., Lin, X., Reiter, J.P.: Privacy preserving regression modeling via distributed computation. In: ACM SIGKDD Int. Conf. Knowledge discovery and data mining (2004)","DOI":"10.1145\/1014052.1014139"},{"key":"74_CR21","doi-asserted-by":"crossref","unstructured":"Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: Proc. ACM SAC Conf. Data Mining Track (2006)","DOI":"10.1145\/1141277.1141415"},{"key":"74_CR22","unstructured":"Poulet, F.: Multi-way distributed SVM. In: Proc. European Conf. Machine Learning, ECML 2003 (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11731139_74.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,24]],"date-time":"2021-07-24T18:13:11Z","timestamp":1627150391000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11731139_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540332060","9783540332077"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11731139_74","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}