{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:00:48Z","timestamp":1754107248228,"version":"3.40.4"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029306"},{"type":"electronic","value":"9783319029313"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-02931-3_29","type":"book-chapter","created":{"date-parts":[[2013,10,5]],"date-time":"2013-10-05T10:00:13Z","timestamp":1380967213000},"page":"259-267","source":"Crossref","is-referenced-by-count":32,"title":["Privacy Preserving Distributed Data Mining with Evolutionary Computing"],"prefix":"10.1007","author":[{"given":"Lambodar","family":"Jena","sequence":"first","affiliation":[]},{"given":"Narendra Ku.","family":"Kamila","sequence":"additional","affiliation":[]},{"given":"Sushruta","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","volume-title":"Advances in Distributed and Parallel Knowledge Discovery","author":"H. Kargupta","year":"2000","unstructured":"Kargupta, H., Chan, P.: Advances in Distributed and Parallel Knowledge Discovery. MIT, AAAI Press, Cambridge, New York (2000)"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving data mining: Why, how and when. IEEE Security and Privacy, 19\u201327 (November\/December 2004)","DOI":"10.1109\/MSP.2004.108"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Ramakrishnan, S., Agrawal, R., Gehrke, J.: Privacy- preserving mining of association rules. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada (July 2002)","DOI":"10.1145\/775047.775080"},{"key":"29_CR4","unstructured":"Kantarcioglu, M., Vaidya, J.: Privacy preserving naive Bayes classifier for horizontally partitioned data. In: Proceedings of IEEE Workshop on Privacy Preserving Data Mining (2003)"},{"key":"29_CR5","first-page":"639","volume-title":"Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"J. Vaidya","year":"2002","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving association rule mining in vertically partitioned data. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 639\u2013644. ACM Press, New York (2002)"},{"issue":"4","key":"29_CR6","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"V.S. Verykios","year":"2004","unstructured":"Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. IEEE Transactions on Knowledge and Data Engineering\u00a016(4), 434\u2013447 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th International Conference on Very Large Data Bases, pp. 682\u2013693 (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"issue":"2","key":"29_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/772862.772863","volume":"4","author":"C. Clifton","year":"2002","unstructured":"Clifton, C., Kantarcioglou, M., Lin, X., Zhu, M.Y.: Tools for privacy preserving distributed data mining. SIGKDD Exploration\u00a04(2), 1\u20137 (2002)","journal-title":"SIGKDD Exploration"},{"key":"29_CR9","first-page":"206","volume-title":"Proceedings of 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"J. Vaidya","year":"2003","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 206\u2013215. ACM Press, New York (2003)"},{"key":"29_CR10","unstructured":"Kantarcioglu, M., Vaidya, J.: Privacy-preserving naive Bayes classifier for horizontally partitioned data. In: IEEE Workshop on Privacy Preserving Data Mining (2003)"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy preserving naive Bayes classifier on vertically partitioned data. In: 2004 SIAM International Conference on Data Mining (2004)","DOI":"10.1137\/1.9781611972740.59"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Wright, R., Yang, Z.: Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. In: KDD 2004, Seattle, Washington, USA (August 2004)","DOI":"10.1145\/1014052.1014145"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Yang, Z., Zhong, S., Wright, R.: Privacy-preserving classification of customer data without loss of accuracy. In: Proceedings of the 5th SIAM International Conference on Data Mining, Newport Beach, CA (April 2005)","DOI":"10.1137\/1.9781611972757.9"},{"key":"29_CR14","first-page":"1975","volume":"11","author":"E. Alpaydin","year":"1999","unstructured":"Alpaydin, E.: Combined 5 _ 2 CV F-test for comparing supervised classification learning classifiers. Neural Computation\u00a011, 1975\u20131982 (1999)","journal-title":"Neural Computation"},{"issue":"17","key":"29_CR15","doi-asserted-by":"publisher","first-page":"3592","DOI":"10.1016\/j.ins.2007.01.016","volume":"177","author":"S. Cohen","year":"2007","unstructured":"Cohen, S., Rokach, L., Maimon, O.: Decision-tree instance-space decomposition with grouped gain-ratio. Information Sciences\u00a0177(17), 3592\u20133612 (2007)","journal-title":"Information Sciences"},{"key":"29_CR16","unstructured":"Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery: An overview. In: Advances in Knowledge Discovery and Data Mining, pp. 1\u201331. AAAI Press, Menlo Park (1996)"},{"key":"29_CR17","unstructured":"Fonseca, C.M., Fleming, P.J.: Genetic algorithms for multiobjective optimization: Formulation, discussion and generalization. In: Forrest, S. (ed.) Proc. of the Fifth International Conference on Genetic Algorithms, pp. 416\u2013423. Morgan Kaufmann, San Mateo (1993)"},{"issue":"4","key":"29_CR18","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1007\/s00778-006-0039-5","volume":"17","author":"A. Friedman","year":"2008","unstructured":"Friedman, A., Schuster, R.W.: Providing k-anonymity in data mining. VLDB\u00a017(4), 789\u2013804 (2008)","journal-title":"VLDB"},{"issue":"5","key":"29_CR19","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TKDE.2007.1015","volume":"19","author":"B.C.M. Fung","year":"2007","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Anonymizing classification data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering\u00a019(5), 711\u2013725 (2007)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"29_CR20","first-page":"205","volume-title":"Proc. of the 21st IEEE International Conference on Data Engineering, ICDE 2005","author":"B.C.M. Fung","year":"2005","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: Proc. of the 21st IEEE International Conference on Data Engineering, ICDE 2005, pp. 205\u2013216. IEEE Computer Society, Washington, DC (2005)"},{"key":"29_CR21","volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Boston (1989)"},{"issue":"1","key":"29_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0377-2217(01)00123-0","volume":"137","author":"D.F. Jones","year":"2002","unstructured":"Jones, D.F., Mirrazavi, S.K., Tamiz, M.: Multiobjective meta-heuristics: An overview of the current state-of-the-art. European Journal of Operational Research\u00a0137(1), 1\u20139 (2002)","journal-title":"European Journal of Operational Research"},{"issue":"3","key":"29_CR23","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1016\/j.ins.2007.08.022","volume":"178","author":"S.W. Kim","year":"2008","unstructured":"Kim, S.W., Park, S., Won, J.I., Kim, A.W.: Privacy preserving data mining of sequential patterns for network traffic data. Information Sciences\u00a0178(3), 694\u2013713 (2008)","journal-title":"Information Sciences"},{"key":"29_CR24","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.ress.2005.11.018","volume":"91","author":"D.W. Konaka","year":"2006","unstructured":"Konaka, D.W., Coitb, A.E.: Smithc, Multi-objective optimization using genetic algorithms: A tutorial. Reliability Engineering and System Safety\u00a091, 992\u20131007 (2006)","journal-title":"Reliability Engineering and System Safety"},{"key":"29_CR25","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3927.001.0001","volume-title":"An Introduction to Genetic Algorithms","author":"M. Mitchell","year":"1996","unstructured":"Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1996)"},{"key":"29_CR26","unstructured":"Meints, M., Moller, J.: Privacy preserving data mining \u2013 a process centric view from a European perspective (2004), http:\/\/www.fidis.net"},{"key":"29_CR27","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1023\/A:1008386925927","volume":"11","author":"P.K. Sharpe","year":"1999","unstructured":"Sharpe, P.K., Glover, R.P.: Efficient GA based techniques for classification. Applied Intelligence\u00a011, 277\u2013284 (1999)","journal-title":"Applied Intelligence"},{"issue":"7","key":"29_CR28","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1016\/j.ins.2008.11.038","volume":"179","author":"J. Zhang","year":"2009","unstructured":"Zhang, J., Zhuang, J., Du, H., Wang, S.: Self-organizing genetic algorithm based tuning of PID controllers. Information Sciences\u00a0179(7), 1007\u20131018 (2009)","journal-title":"Information Sciences"},{"issue":"2","key":"29_CR29","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1162\/106365600568202","volume":"8","author":"E. Zitzler","year":"2000","unstructured":"Zitzler, E., Deb, K., Thiele, L.: Comparison of multiobjective evolutionary algorithms: Empirical results. Evolutionary Computation\u00a08(2), 173\u2013195 (2000)","journal-title":"Evolutionary Computation"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02931-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T15:34:41Z","timestamp":1746027281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-02931-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319029306","9783319029313"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02931-3_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}