{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:04:17Z","timestamp":1726002257205},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051709"},{"type":"electronic","value":"9783030051716"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_10","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"189-208","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data"],"prefix":"10.1007","author":[{"given":"Riddhi","family":"Ghosal","sequence":"first","affiliation":[]},{"given":"Sanjit","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R: Privacy-preserving data mining, vol. 29. ACM (2000)","DOI":"10.1145\/335191.335438"},{"key":"10_CR2","unstructured":"Alsabti, K., Ranka, S., Singh, V.: An efficient k-means clustering algorithm (1997)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Beye, M., Erkin, Z., Lagendijk, R.L.: Efficient privacy preserving k-means clustering in a three-party setting. In: 2011 IEEE International Workshop on Information Forensics and Security, pp. 1\u20136 (2011)","DOI":"10.1109\/WIFS.2011.6123148"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-319-99136-8_15","volume-title":"Developments in Language Theory","author":"Colin Boyd","year":"2018","unstructured":"Boyd, C., Davies, G.T., Gj\u00f8steen, K., Jiang, Y.: Offline assisted group key exchange. Cryptology ePrint Archive, Report 2018\/114 (2018). https:\/\/eprint.iacr.org\/2018\/114"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 486\u2013497, ACM, New York (2007)","DOI":"10.1145\/1315245.1315306"},{"issue":"4","key":"10_CR6","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/LGRS.2009.2025059","volume":"6","author":"T Celik","year":"2009","unstructured":"Celik, T.: Unsupervised change detection in satellite images using principal component analysis and $$ k $$-means clustering. IEEE Geosci. Remote Sens. Lett. 6(4), 772\u2013776 (2009)","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Fifth IEEE International Conference on Data Mining (ICDM 2005), 4 p. (2005)","DOI":"10.1109\/ICDM.2005.121"},{"issue":"2","key":"10_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/293411.293440","volume":"42","author":"LF Cranor","year":"1999","unstructured":"Cranor, L.F.: Internet privacy. Commun. ACM 42(2), 28\u201338 (1999)","journal-title":"Commun. ACM"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Doganay, M.C., Pedersen, T.B., Saygin, Y., Sava\u015f, E., Levi, A.: Distributed privacy preserving k-means clustering with additive secret sharing. In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, pp. 3\u201311. ACM, New York (2008)","DOI":"10.1145\/1379287.1379291"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Ron, D., Sudan, M.: Chinese remaindering with errors. In: Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, pp. 225\u2013234. ACM (1999)","DOI":"10.1145\/301250.301309"},{"issue":"1","key":"10_CR11","first-page":"100","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan, J.A., Wong, M.A.: Algorithm as 136: a k-means clustering algorithm. J. R. Stat. Soc. Ser. C (Appl. Stat.) 28(1), 100\u2013108 (1979)","journal-title":"J. R. Stat. Soc. Ser. C (Appl. Stat.)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Hershey, J.R., Olsen, P.A.: Approximating the Kullback Leibler divergence between Gaussian mixture models. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007, vol. 4, p. IV\u2013317. IEEE (2007)","DOI":"10.1109\/ICASSP.2007.366913"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Pillaipakkamnatt, K., Wright, R.N.: A new privacy-preserving distributed k-clustering algorithm. In: Proceedings of the 2006 SIAM International Conference on Data Mining, pp. 494\u2013498. SIAM (2006)","DOI":"10.1137\/1.9781611972764.47"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, KDD 2005, pp. 593\u2013599. ACM, New York (2005)","DOI":"10.1145\/1081870.1081942"},{"issue":"8","key":"10_CR15","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.patrec.2009.09.011","volume":"31","author":"AK Jain","year":"2010","unstructured":"Jain, A.K.: Data clustering: 50 years beyond k-means. Pattern Recogn. Lett. 31(8), 651\u2013666 (2010)","journal-title":"Pattern Recogn. Lett."},{"issue":"7","key":"10_CR16","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/TPAMI.2002.1017616","volume":"24","author":"T. Kanungo","year":"2002","unstructured":"Kanungo, T., Mount, D.M., Netanyahu, N.S., Piatko, C.D., Silverman, R., Wu, A.Y.: An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. (7), 881\u2013892 (2002)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Kaplan, E., Gursoy, M.E., Nergiz, M.E., Saygin, Y.: Known sample attacks on relation preserving data transformations. IEEE Trans. Dependable Secure Comput. (2017)","DOI":"10.1109\/TDSC.2017.2759732"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Third IEEE International Conference on Data Mining, ICDM 2003, pp. 99\u2013106. IEEE (2003)","DOI":"10.1109\/ICDM.2003.1250908"},{"issue":"4","key":"10_CR19","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10115-004-0173-6","volume":"7","author":"H Kargupta","year":"2005","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst. 7(4), 387\u2013414 (2005)","journal-title":"Knowl. Inf. Syst."},{"issue":"2","key":"10_CR20","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/S0031-3203(02)00060-2","volume":"36","author":"A Likas","year":"2003","unstructured":"Likas, A., Vlassis, N., Verbeek, J.J.: The global k-means clustering algorithm. Pattern Recogn. 36(2), 451\u2013461 (2003)","journal-title":"Pattern Recogn."},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Liu, D., Bertino, E., Yi, X.: Privacy of outsourced k-means clustering. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014, pp. 123\u2013134. ACM, New York (2014)","DOI":"10.1145\/2590296.2590332"},{"issue":"1","key":"10_CR22","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K Liu","year":"2006","unstructured":"Liu, K.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1), 92\u2013106 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/11871637_30","volume-title":"Knowledge Discovery in Databases: PKDD 2006","author":"K Liu","year":"2006","unstructured":"Liu, K., Giannella, C., Kargupta, H.: An attacker\u2019s view of distance preserving maps for privacy preserving data mining. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 297\u2013308. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11871637_30"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.50","volume":"18","author":"K Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18, 92\u2013106 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/3-540-39466-4_27","volume-title":"Cryptography","author":"M Mignotte","year":"1983","unstructured":"Mignotte, M.: How to share a secret. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 371\u2013375. Springer, Heidelberg (1983). https:\/\/doi.org\/10.1007\/3-540-39466-4_27"},{"key":"10_CR26","unstructured":"Mitra, S.K.: On a generalised inverse of a matrix and applications. Sankhy\u0101: Indian J. Stat. Ser. A, 107\u2013114 (1968)"},{"key":"10_CR27","unstructured":"Oyelade, O.J., Oladipupo, O.O., Obagbuwa, I.C.: Application of k means clustering algorithm for prediction of students academic performance. arXiv preprint arXiv:1002.2425 (2010)"},{"key":"10_CR28","unstructured":"Samet, S., Miri, A., Orozco-Barbosa, L.: Privacy preserving k-means clustering in multi-party environment. In: SECRYPT (2007)"},{"key":"10_CR29","series-title":"Advances in Soft Computing","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-74972-1_11","volume-title":"Innovations in Hybrid Intelligent Systems","author":"A Tellaeche","year":"2007","unstructured":"Tellaeche, A., BurgosArtizzu, X.-P., Pajares, G., Ribeiro, A.: A vision-based hybrid classifier for weeds detection in precision agriculture through the Bayesian and fuzzy k-means paradigms. In: Corchado, E., Corchado, J.M., Abraham, A. (eds.) Innovations in Hybrid Intelligent Systems. AINSC, vol. 44, pp. 72\u201379. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74972-1_11"},{"key":"10_CR30","unstructured":"Turow, J.: Americans online privacy: the system is broken (2003)"},{"key":"10_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-642-13601-6_17","volume-title":"Intelligence and Security Informatics","author":"M Upmanyu","year":"2010","unstructured":"Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.V.: Efficient privacy preserving k-means clustering. In: Chen, H., Chau, M., Li, S., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol. 6122, pp. 154\u2013166. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13601-6_17"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 206\u2013215. ACM, New York (2003)","DOI":"10.1145\/956750.956776"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Yu, T.-K., Lee, D.T., Chang, S.-M., Zhan, J.Z.: Multi-party k-means clustering with privacy consideration. In: International Symposium on Parallel and Distributed Processing with Applications, pp. 200\u2013207 (2010)","DOI":"10.1109\/ISPA.2010.8"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:25:41Z","timestamp":1573053941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}