{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:30:35Z","timestamp":1743114635831,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319257532"},{"type":"electronic","value":"9783319257549"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25754-9_12","type":"book-chapter","created":{"date-parts":[[2015,11,21]],"date-time":"2015-11-21T09:12:37Z","timestamp":1448097157000},"page":"129-139","source":"Crossref","is-referenced-by-count":5,"title":["Imprecise Rules for Data Privacy"],"prefix":"10.1007","author":[{"given":"Masahiro","family":"Inuiguchi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takuya","family":"Hamakawa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seiki","family":"Ubukata","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"IH Witten","year":"2011","unstructured":"Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Morgan Kaufmann, Burlington (2011)","edition":"3"},{"issue":"5","key":"12_CR2","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak, Z.: Rough Sets. Int. J. Comput. Inf. Sci. 11(5), 341\u2013356 (1982)","journal-title":"Int. J. Comput. Inf. Sci."},{"key":"12_CR3","series-title":"AISC","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-02821-7_6","volume-title":"Knowledge and Systems Engineering","author":"M Inuiguchi","year":"2013","unstructured":"Inuiguchi, M., Hamakawa, T.: The utilities of imprecise rules and redundant rules for classifiers. In: Huynh, V.-N., et al. (eds.) Knowledge and Systems Engineering. AISC, vol. 245, pp. 45\u201356. Springer, Heidelberg (2013)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Hamakawa, T, Inuiguchi, M.: On the Utility of Imprecise Rules Induced by MLEM2 in Classification. In: Proceedings of 2014 IEEE International Conference on Granular Computing C, pp. 76\u201381. IEEE Xplore (2014)","DOI":"10.1109\/GRC.2014.6982811"},{"key":"12_CR5","first-page":"91","volume-title":"Theory and Practical Applications for Statistical Agencies","author":"J Domingo-Ferrer","year":"2001","unstructured":"Domingo-Ferrer, J., Torra, V.: Disclosure control methods and information loss for microdata, confidentiality, disclosure, and data access. In: Doyle, P., et al. (eds.) Theory and Practical Applications for Statistical Agencies, pp. 91\u2013110. Elsevier, Amsterdam (2001)"},{"issue":"6","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"5","key":"12_CR7","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl. Based Sys. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty, Fuzziness Knowl. Based Sys."},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"issue":"3\u20134","key":"12_CR9","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Yakoubov, S., Gadepally, V., Schear, N., Shen, E., Yerukhimovich, A.: A survey of cryptographic approaches to securing big-data analytics in the cloud. In: Proceedings of 2014 IEEE High Performance Extreme Computing Conference, pp. 1\u20136. IEEE Xplore (2014)","DOI":"10.1109\/HPEC.2014.7040943"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Huang, L., Yun, Y.: Privacy preserving attribute reduction based on rough set. In: Proceedings of 2nd International Workshop on Knowledge Discovery and Data Mining. WKKD 2009, pp. 202\u2013206. AAAI, Portland (2009)","DOI":"10.1109\/WKDD.2009.87"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Rokach, L., Schclar, A.: k-anonymized reducts. In: Proceedings of 2010 IEEE International Conference on Granular Computing, pp. 392\u2013395. IEEE Xplore (2010)","DOI":"10.1109\/GrC.2010.162"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.knosys.2013.01.007","volume":"43","author":"M Ye","year":"2013","unstructured":"Ye, M., Wu, X., Hu, X., Hu, D.: Anonymizing classification data using rough set theory. Knowl. Based Sys. 43, 82\u201394 (2013)","journal-title":"Knowl. Based Sys."},{"key":"12_CR14","series-title":"AISC","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-540-36562-4_53","volume-title":"Intelligent Information Processing and Web Mining","author":"JW Grzymala-Busse","year":"2003","unstructured":"Grzymala-Busse, J.W.: MLEM2 - discretization during rule induction. In: Klopotek, M.A., Wierzchon, S.T., Trojanowski, K. (eds.) Intelligent Information Processing and Web Mining. AISC, vol. 22, pp. 499\u2013508. Springer, Heidelberg (2003)"},{"key":"12_CR15","unstructured":"UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml\/"}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Knowledge Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25754-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T16:04:55Z","timestamp":1729094695000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-25754-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319257532","9783319257549"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25754-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}