{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:44:23Z","timestamp":1761561863854,"version":"3.40.4"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319064826"},{"type":"electronic","value":"9783319064833"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06483-3_13","type":"book-chapter","created":{"date-parts":[[2014,4,30]],"date-time":"2014-04-30T13:07:57Z","timestamp":1398863277000},"page":"143-154","source":"Crossref","is-referenced-by-count":18,"title":["Task Oriented Privacy Preserving Data Publishing Using Feature Selection"],"prefix":"10.1007","author":[{"given":"Yasser","family":"Jafer","sequence":"first","affiliation":[]},{"given":"Stan","family":"Matwin","sequence":"additional","affiliation":[]},{"given":"Marina","family":"Sokolova","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.cose.2011.05.005","volume":"30","author":"X. Sun","year":"2011","unstructured":"Sun, X., Wang, H., Li, J., Zhang, Y.: Injecting purpose and trust into data anonymization. Computers & Security\u00a030, 332\u2013345 (2011)","journal-title":"Computers & Security"},{"issue":"5","key":"13_CR2","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based System\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based System"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, USA, pp. 277\u2013286 (2006)","DOI":"10.1145\/1150402.1150435"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: Proceedings of the 21st International Conference on Data Engineering, pp. 205\u2013216 (2005)","DOI":"10.1109\/ICDE.2005.143"},{"key":"13_CR5","unstructured":"Wang, K., Yu, P., Chakraborty, S.: Bottom-up generalization-A data mining solu-tion to privacy protection. In: Proceedings of the 4th IEEE International Conference on Data Mining, Brighton, UK, pp. 249\u2013256 (2004)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Iyengar, V.: Transforming data to satisfy privacy constraints. In: Proceedings of the 8th ACM SIGKDD Iinternational Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: The 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, pp. 102\u2013110 (2005)","DOI":"10.1145\/1063979.1063998"},{"key":"13_CR8","unstructured":"Xiong, L., Rangachari, K.: Towards Application-Oriented Data Anonymization. In: First SIAM International Workshop on Practical Privacy-Preserving Data Mining, Atlanta, US, pp. 1\u201310 (2008)"},{"issue":"6","key":"13_CR9","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TKDE.2003.1245283","volume":"15","author":"M. Hall","year":"2003","unstructured":"Hall, M., Holmes, G.: Benchmarking attribute selection techniques for discrete class data mining. IEEE Transactions on Knowledge and Data Engineering\u00a015(6), 1437\u20131447 (2003)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0304-3975(97)00115-1","volume":"209","author":"E. Amaldi","year":"1998","unstructured":"Amaldi, E., Kann, V.: On the approximation of minimizing non zero variables or unsatisfied relations in linear systems. Theoretical Computer Science\u00a0209, 237\u2013260 (1998)","journal-title":"Theoretical Computer Science"},{"key":"13_CR11","first-page":"1157","volume":"3","author":"I. Guyon","year":"2003","unstructured":"Guyon, I., Elisseff, A.: An introduction to variable and feature selection. Journal of Machine Learning Research\u00a03, 1157\u20131182 (2003)","journal-title":"Journal of Machine Learning Research"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Fung, B., Wang, K., Chen, R., Yu, P.: Privacy-Preserving Data Publishing - A Survey of Recent Development. ACM Computing Surveys\u00a042(4), Article 14 (2010)","DOI":"10.1145\/1749603.1749605"},{"issue":"3","key":"13_CR13","doi-asserted-by":"publisher","first-page":"177","DOI":"10.5626\/JCSE.2013.7.3.177","volume":"7","author":"H.H. Nguyen","year":"2013","unstructured":"Nguyen, H.H., Kim, J.: Differential Privacy in Practice. Journal of Computing Science and Engineering\u00a07(3), 177\u2013186 (2013)","journal-title":"Journal of Computing Science and Engineering"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Proceedings of 33rd International Colloquium on Automata, Languages and Programming, Venice, Italy, pp. 1\u201312 (2006)","DOI":"10.1007\/11787006_1"},{"key":"13_CR15","first-page":"161","volume":"6","author":"C. Clifton","year":"2013","unstructured":"Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. Transactions of Data Privacy\u00a06, 161\u2013183 (2013)","journal-title":"Transactions of Data Privacy"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Soria-Comas, J., Domingo-Ferrer, J., Sanchez, D., Martinez, S.: Improving the utility of differentially private data releases via k-anonymity. CoRR abs\/1307.0966 (2013)","DOI":"10.1109\/TrustCom.2013.47"},{"key":"13_CR17","unstructured":"Li, N., Qardaji, W.: Su, Dong.: Provably private data anonyization: Or, k-anonymity meets differential privacy, CoRR abs\/1101.2604 (2011)"},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R. Kohavi","year":"1997","unstructured":"Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artificial Intelligence\u00a097, 273\u2013324 (1997)","journal-title":"Artificial Intelligence"},{"key":"13_CR19","unstructured":"UCI repository, http:\/\/archive.ics.uci.edu\/ml\/"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Lefevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, Washington DC, USA, pp. 25\u201336 (2006)","DOI":"10.1109\/ICDE.2006.101"},{"issue":"11","key":"13_CR21","doi-asserted-by":"publisher","first-page":"1704","DOI":"10.1109\/TKDE.2010.193","volume":"23","author":"K. Lin","year":"2011","unstructured":"Lin, K., Chen, M.: On the design and analysis of the privacy-preserving SVM classifier. IEEE Transaction on Knowedge and Data Engineering\u00a023(11), 1704\u20131717 (2011)","journal-title":"IEEE Transaction on Knowedge and Data Engineering"},{"key":"13_CR22","unstructured":"Monreale, A.: Privacy by design in data mining. PhD dissertation, universit\u2018a degli studi di pisa (2011)"}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06483-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T16:38:17Z","timestamp":1746203897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06483-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319064826","9783319064833"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06483-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}