{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:22:51Z","timestamp":1739424171224,"version":"3.37.0"},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441902207"},{"type":"electronic","value":"9781441902214"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-1-4419-0221-4_53","type":"book-chapter","created":{"date-parts":[[2009,10,3]],"date-time":"2009-10-03T08:01:49Z","timestamp":1254556909000},"page":"449-458","source":"Crossref","is-referenced-by-count":7,"title":["Reconstruction-based Classification Rule Hiding through Controlled Data Modification"],"prefix":"10.1007","author":[{"given":"Aliki","family":"Katsarou","sequence":"first","affiliation":[]},{"given":"Gkoulalas-Divanis","family":"Aris","sequence":"additional","affiliation":[]},{"given":"Vassilios S.","family":"Verykios","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1_53","doi-asserted-by":"crossref","unstructured":"Chang, L., Moskowitz, I.S.: Parsimonious downgrading and decision trees applied to the inference problem. In: Proceedings 1998 Workshop on New Security Paradigms, pp. 82\u201389 (1998)","DOI":"10.1145\/310889.310921"},{"key":"53_CR2_53","unstructured":"Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proceedings 5th IEEE International Conference on Data Mining, pp. 589\u2013592 (2005)"},{"key":"53_CR3_53","doi-asserted-by":"crossref","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Proceedings 12th International Conference on Machine Learning, pp. 115\u2013123 (1995)","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"53_CR4_53","unstructured":"Islam, M.Z., Brankovic, L.: A framework for privacy preserving classification in data mining. In: Proceedings 22nd Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, pp. 163\u2013168 (2004)"},{"key":"53_CR5_53","doi-asserted-by":"crossref","unstructured":"Natwichai, J., Li, X., Orlowska, M.: Hiding classification rules for data sharing with privacy preservation. In: Proceedings 7th International Conference on Data Warehousing and Knowledge Discovery, pp. 468\u2013467 (2005)","DOI":"10.1007\/11546849_46"},{"key":"53_CR6_53","unstructured":"Natwichai, J., Li, X., Orlowska, M.E.: A reconstruction-based algorithm for classification rules hiding. In: Proceedings 17th Australasian Database Conference, pp. 49\u201358 (2006)"},{"key":"53_CR7_53","doi-asserted-by":"crossref","unstructured":"Natwichai, J., Sun, X., Li, X.: Data reduction approach for sensitive associative classification rule hiding. In: Proceedings 19th Australian Conference on Databases (2007)","DOI":"10.1007\/978-3-540-73871-8_29"},{"key":"53_CR8_53","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C., Kantarcioglu, M., Patterson, A.S.: Privacy-preserving decision trees over vertically partitioned data. ACM Trans. Knowl. Discov. Data 2(3) (2008)","DOI":"10.1145\/1409620.1409624"},{"key":"53_CR9_53","doi-asserted-by":"crossref","unstructured":"Xiao, M.J., Huang, L.S., Luo, Y.L., Shen, H.: Privacy preserving ID3 algorithm over horizontally partitioned data. In: Proceedings 6th International Conference on Parallel and Distributed Computing Applications and Technologies, pp. 239\u2013243 (2005)","DOI":"10.1109\/PDCAT.2005.191"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-0221-4_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T14:18:53Z","timestamp":1739369933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-0221-4_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9781441902207","9781441902214"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-0221-4_53","relation":{},"ISSN":["1868-4238"],"issn-type":[{"type":"print","value":"1868-4238"}],"subject":[],"published":{"date-parts":[[2009]]}}}