{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:07:21Z","timestamp":1747368441785,"version":"3.40.5"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928819","type":"print"},{"value":"9783031928826","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92882-6_1","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T14:33:47Z","timestamp":1747319627000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Advanced Strategies for\u00a0Privacy Preserving Data Publishing to\u00a0Improve Multi-class Classification"],"prefix":"10.1007","author":[{"given":"Tibo","family":"Laperre","sequence":"first","affiliation":[]},{"given":"Jenno","family":"Verdonck","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"De Boeck","sequence":"additional","affiliation":[]},{"given":"Michiel","family":"Willocx","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"issue":"1","key":"1_CR1","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s12652-018-1122-7","volume":"11","author":"B Abidi","year":"2020","unstructured":"Abidi, B., Ben Yahia, S., Perera, C.: Hybrid microaggregation for privacy preserving data mining. J. Ambient. Intell. Humaniz. Comput. 11(1), 23\u201338 (2020)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"100190","DOI":"10.1016\/j.bdr.2021.100190","volume":"25","author":"I Ahmed","year":"2021","unstructured":"Ahmed, I., Ahmad, M., Jeon, G., Piccialli, F.: A framework for pandemic prediction using big data analytics. Big Data Res. 25, 100190 (2021)","journal-title":"Big Data Res."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Almasi, M.M., Siddiqui, T.R., Mohammed, N., Hemmati, H.: The risk-utility tradeoff for data privacy models. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp.\u00a01\u20135. IEEE (2016)","DOI":"10.1109\/NTMS.2016.7792481"},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Becker, B., Kohavi, R.: Adult. UCI Machine Learning Repository (1996). https:\/\/doi.org\/10.24432\/C5XW20","DOI":"10.24432\/C5XW20"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Bild, R., Kuhn, K.A., Prasser, F.: SafePub: a truthful data anonymization algorithm with strong privacy guarantees. Proc. Priv. Enhanc. Technol. 2018(1), 67\u201387 (2018). https:\/\/doi.org\/10.1515\/popets-2018-0004","DOI":"10.1515\/popets-2018-0004"},{"key":"1_CR6","unstructured":"Calzon, B.: The importance of data driven decision making for business. BI Blog $$\\vert $$ Data Visualization & Analytics Blog $$\\vert $$ datapine (2023)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Cao, L.: Social security and social welfare data mining: an overview. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 42(6), 837\u2013853 (2012)","DOI":"10.1109\/TSMCC.2011.2177258"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Carvalho, T., Moniz, N.: The compromise of data privacy in predictive performance. In: International Symposium on Intelligent Data Analysis, pp. 426\u2013438. Springer (2021)","DOI":"10.1007\/978-3-030-74251-5_34"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"De\u00a0Boeck, K., Verdonck, J., Willocx, M., Lapon, J., Naessens, V.: Dataset anonymization with purpose: a resource allocation use case. In: 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC), pp. 202\u2013210. IEEE (2021)","DOI":"10.1109\/ISCSIC54682.2021.00045"},{"key":"1_CR10","unstructured":"Ding, F., Hardt, M., Miller, J., Schmidt, L.: Retiring adult: new datasets for fair machine learning. In: Advances in Neural Information Processing Systems, vol. 34 (2021)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: International colloquium on automata, languages, and programming, pp. 1\u201312. Springer (2006)","DOI":"10.1007\/11787006_1"},{"key":"1_CR12","unstructured":"EUR-Lex: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. Accessed 20 Oct 2022"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"107868","DOI":"10.1016\/j.ijpe.2020.107868","volume":"231","author":"S Kaffash","year":"2021","unstructured":"Kaffash, S., Nguyen, A.T., Zhu, J.: Big data algorithms and applications in intelligent transportation system: a review and bibliometric analysis. Int. J. Prod. Econ. 231, 107868 (2021)","journal-title":"Int. J. Prod. Econ."},{"key":"1_CR14","unstructured":"Karkera, A., Kelkar, M., Mariani, J., Nuttall, Dr.K.: Bridging the data-sharing chasm $$\\vert $$ Deloitte. Deloitte Insights (2023)"},{"issue":"7","key":"1_CR15","doi-asserted-by":"publisher","first-page":"e0271260","DOI":"10.1371\/journal.pone.0271260","volume":"17","author":"M Kim","year":"2022","unstructured":"Kim, M., Hwang, K.B.: An empirical evaluation of sampling methods for the classification of imbalanced data. PLoS ONE 17(7), e0271260 (2022)","journal-title":"PLoS ONE"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: T-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106\u2013115. IEEE (2006)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Li, N., Qardaji, W., Su, D.: On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 32\u201333 (2012)","DOI":"10.1145\/2414456.2414474"},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Lim, T.S.: Contraceptive method choice. UCI Machine Learning Repository (1997). https:\/\/doi.org\/10.24432\/C59W2D","DOI":"10.24432\/C59W2D"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3\u2013es (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"1_CR20","unstructured":"Mastrola, M.: How AI can help combat climate change - Johns Hopkins Institute for assured autonomy. Johns Hopkins Institute for Assured Autonomy (2023)"},{"key":"1_CR21","unstructured":"Mivule, K.: Utilizing noise addition for data privacy, an overview. arXiv preprint arXiv:1309.3958 (2013)"},{"issue":"6","key":"1_CR22","first-page":"61","volume":"13","author":"IK Nti","year":"2021","unstructured":"Nti, I.K., Nyarko-Boateng, O., Aning, J., et al.: Performance of machine learning algorithms with different k values in k-fold cross-validation. Int. J. Inf. Technol. Comput. Sci. 13(6), 61\u201371 (2021)","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"1_CR23","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"1_CR24","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/23808993.2019.1617632","volume":"4","author":"T Qian","year":"2019","unstructured":"Qian, T., Zhu, S., Hoshida, Y.: Use of big data in drug development for precision medicine: an update. Expert Rev. Precis. Med. Drug Dev. 4(3), 189\u2013200 (2019)","journal-title":"Expert Rev. Precis. Med. Drug Dev."},{"issue":"12","key":"1_CR25","first-page":"172","volume":"17","author":"K Rajendran","year":"2017","unstructured":"Rajendran, K., Jayabalan, M., Rana, M.E.: A study on k-anonymity, l-diversity, and t-closeness techniques. IJCSNS 17(12), 172 (2017)","journal-title":"IJCSNS"},{"key":"1_CR26","doi-asserted-by":"publisher","unstructured":"Rajkovic, V.: Nursery. UCI Machine Learning Repository (1997). https:\/\/doi.org\/10.24432\/C5P88W","DOI":"10.24432\/C5P88W"},{"issue":"6","key":"1_CR27","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Sen, P.C., Hajra, M., Ghosh, M.: Supervised classification algorithms in machine learning: a survey and review. In: Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018, pp. 99\u2013111. Springer (2020)","DOI":"10.1007\/978-981-13-7403-6_11"},{"key":"1_CR29","doi-asserted-by":"publisher","first-page":"102488","DOI":"10.1016\/j.cose.2021.102488","volume":"111","author":"D Slijep\u010devi\u0107","year":"2021","unstructured":"Slijep\u010devi\u0107, D., Henzl, M., Klausner, L.D., Dam, T., Kieseberg, P., Zeppelzauer, M.: k-anonymity in practice: how generalisation and suppression affect machine learning classifiers. Comput. Secur. 111, 102488 (2021)","journal-title":"Comput. Secur."},{"issue":"1","key":"1_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00349-y","volume":"7","author":"J Tanha","year":"2020","unstructured":"Tanha, J., Abdi, Y., Samadi, N., Razzaghi, N., Asadpour, M.: Boosting methods for multi-class imbalanced data classification: an experimental review. J. Big Data 7(1), 1\u201347 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00349-y","journal-title":"J. Big Data"},{"key":"1_CR31","unstructured":"The European Commission: A European strategy for data (2020). https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/strategy-data. Accessed 20 Jun 2024"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Verdonck, J., De\u00a0Boeck, K., Willocx, M., Lapon, J., Naessens, V.: A hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ml purposes. In: Proceedings of the 18th International Conference on Availability, Reliability and Security, pp. 1\u201311 (2023)","DOI":"10.1145\/3600160.3600168"},{"issue":"3","key":"1_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3168389","volume":"51","author":"I Wagner","year":"2018","unstructured":"Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. (CSUR) 51(3), 1\u201338 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1_CR34","first-page":"16","volume":"1","author":"Z Xu","year":"2020","unstructured":"Xu, Z., Cheng, C., Sugumaran, V.: Big data analytics of crime prevention and control based on image processing upon cloud computing. J. Surveill. Secur. Saf. 1, 16\u201333 (2020)","journal-title":"J. Surveill. Secur. Saf."},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Zheng, W., Jin, M.: Effects of training data size and class imbalance on the performance of classifiers. In: Conference on Artificial Intelligence and Natural Language, pp. 3\u201317. Springer (2019)","DOI":"10.1007\/978-3-030-34518-1_1"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92882-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T14:34:00Z","timestamp":1747319640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92882-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928819","9783031928826"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92882-6_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}