{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:47:00Z","timestamp":1775054820332,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540453741","type":"print"},{"value":"9783540460480","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11871637_30","type":"book-chapter","created":{"date-parts":[[2006,9,19]],"date-time":"2006-09-19T07:09:53Z","timestamp":1158649793000},"page":"297-308","source":"Crossref","is-referenced-by-count":77,"title":["An Attacker\u2019s View of Distance Preserving Maps for Privacy Preserving Data Mining"],"prefix":"10.1007","author":[{"given":"Kun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chris","family":"Giannella","sequence":"additional","affiliation":[]},{"given":"Hillol","family":"Kargupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proc. ACM SIGMOD, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"issue":"5","key":"30_CR2","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10115-004-0173-6","volume":"7","author":"H. Kargupta","year":"2005","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random data perturbation techniques and privacy preserving data mining. Knowledge and Information Systems\u00a07(5), 387\u2013414 (2005)","journal-title":"Knowledge and Information Systems"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proc. ACM SIGMOD, pp. 37\u201348 (2005)","DOI":"10.1145\/1066157.1066163"},{"issue":"5","key":"30_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"30_CR5","unstructured":"Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proc. IEEE ICDM, pp. 589\u2013592 (2005)"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R.: Privacy preservation when sharing data for clustering. In: Proc. Workshop on Secure Data Management in a Connected World, pp. 67\u201382 (2004)","DOI":"10.1007\/978-3-540-30073-1_6"},{"key":"30_CR7","volume-title":"Algebra","author":"M. Artin","year":"1991","unstructured":"Artin, M.: Algebra. Prentice Hall, Englewood Cliffs (1991)"},{"issue":"4","key":"30_CR8","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"key":"30_CR9","series-title":"Springer Series in Statistics","volume-title":"Principal Component Analysis","author":"I.T. Jolliffe","year":"2002","unstructured":"Jolliffe, I.T.: Principal Component Analysis, 2nd edn. Springer Series in Statistics. Springer, Heidelberg (2002)","edition":"2"},{"key":"30_CR10","volume-title":"Linear Algebra and Its Applications","author":"G. Strang","year":"1986","unstructured":"Strang, G.: Linear Algebra and Its Applications, 3rd edn. Harcourt Brace Jovanovich College Publishers, New York (1986)","edition":"3"},{"key":"30_CR11","unstructured":"Szek\u00e9ly, G.J., Rizzo, M.L.: Testing for equal distributions in high dimensions. InterStat\u00a0(5) (November 2004)"},{"key":"30_CR12","volume-title":"Advances in Information Security","author":"J. Vaidya","year":"2006","unstructured":"Vaidya, J., Clifton, C., Zhu, M.: Privacy Preserving Data Mining. In: Advances in Information Security, vol.\u00a019. Springer, Heidelberg (2006)"},{"key":"30_CR13","unstructured":"Kim, J.J., Winkler, W.E.: Multiplicative noise for masking continuous data. Technical Report Statistics #2003-01, Statistical Research Division, U.S. Bureau of the Census (2003)"},{"issue":"1","key":"30_CR14","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K. Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering\u00a018(1), 92\u2013106 (2006)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Evfimevski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proc. ACM PODS (2003)","DOI":"10.1145\/773153.773174"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: Proc. 28th VLDB, pp. 682\u2013693 (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proc. 30th VLDB, pp. 720\u2013731 (2004)","DOI":"10.1016\/B978-012088469-8.50064-4"},{"issue":"4","key":"30_CR18","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"V.S. Verykios","year":"2004","unstructured":"Verykios, V.S., Elmagarmid, A.K., Elisa, B., Saygin, Y., Elena, D.: Association rule hiding. IEEE Transactions on Knowledge and Data Engineering\u00a016(4), 434\u2013447 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Fienberg, S.E., McIntyre, J.: Data swapping: Variations on a theme by dalenius and reiss. Technical report, U.S. National Institute of Statistical Sciences (2003)","DOI":"10.1007\/978-3-540-25955-8_2"}],"container-title":["Lecture Notes in Computer Science","Knowledge Discovery in Databases: PKDD 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11871637_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:46:43Z","timestamp":1605624403000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11871637_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540453741","9783540460480"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11871637_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}