{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T04:08:11Z","timestamp":1748923691454,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319317496"},{"type":"electronic","value":"9783319317502"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31750-2_31","type":"book-chapter","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T11:27:08Z","timestamp":1460633228000},"page":"388-400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy Aware K-Means Clustering with High Utility"],"prefix":"10.1007","author":[{"given":"Thanh Dai","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Sunil","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Santu","family":"Rana","sequence":"additional","affiliation":[]},{"given":"Svetha","family":"Venkatesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,12]]},"reference":[{"issue":"2","key":"31_CR1","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Rec. 29(2), 439\u2013450 (2000). ACM","journal-title":"ACM SIGMOD Rec."},{"issue":"05","key":"31_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"31_CR3","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-0-387-70992-5_5","volume-title":"Privacy-Preserving Data Mining","author":"V Ciriani","year":"2008","unstructured":"Ciriani, V., di Vimercati, S.D.C., Foresti, S., Samarati, P.: k-anonymous data mining: a survey. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database Systems, vol. 34, pp. 105\u2013136. Springer, US (2008)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Malik, M.B., Ghazi, M.A., Ali, R.: Privacy preserving data mining techniques: current scenario and future prospects. In: ICCCT 2012, pp. 26\u201332. IEEE (2012)","DOI":"10.1109\/ICCCT.2012.15"},{"key":"31_CR5","unstructured":"Begelman, G., Keller, P., Smadja, F., et al.: Automated tag clustering: improving search and exploration in the tag space. In: Collaborative Web Tagging Workshop at WWW2006, pp. 15\u201333 (2006)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Fred, A.L., Jain, A.K.: Data clustering using evidence accumulation. In: ICPR 2002, vol. 4, pp. 276\u2013280. IEEE (2002)","DOI":"10.1109\/ICPR.2002.1047450"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Zeng, H.-J., He, Q.-C., Chen, Z., Ma, W.-Y., Ma, J.: Learning to cluster web search results. In: ACM SIGIR 2004, pp. 210\u2013217 (2004)","DOI":"10.1145\/1008992.1009030"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: KDD 2003, pp. 206\u2013215. ACM (2003)","DOI":"10.1145\/956750.956776"},{"issue":"3","key":"31_CR9","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.datak.2007.03.015","volume":"63","author":"A Inan","year":"2007","unstructured":"Inan, A., Kaya, S.V., Sayg\u0131n, Y., Sava\u015f, E., Hinto\u011flu, A.A., Levi, A.: Privacy preserving clustering on horizontally partitioned data. Data Knowl. Eng. 63(3), 646\u2013666 (2007)","journal-title":"Data Knowl. Eng."},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: KDD 2005, pp. 593\u2013599. ACM (2005)","DOI":"10.1145\/1081870.1081942"},{"key":"31_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"31_CR12","unstructured":"Chaudhuri, K., Monteleoni, C.: Privacy-preserving logistic regression. In: NIPS 2009, pp. 289\u2013296 (2009)"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Pillaipakkamnatt, K., Wright, R.N.: A practical differentially private random decision tree classifier. In: ICDMW 2009, pp. 114\u2013121. IEEE (2009)","DOI":"10.1109\/ICDMW.2009.93"},{"key":"31_CR14","unstructured":"Hua, J., Xia, C., Zhong, S.: Differentially private matrix factorization. In: IJCAI (2015)"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the sulq framework. In: PODS 2005, pp. 128\u2013138. ACM (2005)","DOI":"10.1145\/1065167.1065184"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: ACM SIGMOD International Conference on Management of Data (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Su, D., Cao, J., Li, N., Bertino, E., Jin, H.: Differentially private $$k$$ -means clustering. CoRR, abs\/1504.05998 (2015)","DOI":"10.1145\/2857705.2857708"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Rana, S., Gupta, S., Venkatesh, S.: Differentially private random forest with high utility. In: IEEE International Conference on Data Mining (2015)","DOI":"10.1109\/ICDM.2015.76"},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"issue":"2","key":"31_CR20","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"SP Lloyd","year":"1982","unstructured":"Lloyd, S.P.: Least squares quantization in PCM. IEEE Trans. Inf. Theor. 28(2), 129\u2013137 (1982)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"31_CR21","doi-asserted-by":"crossref","DOI":"10.1201\/9780429246593","volume-title":"An Introduction to the Bootstrap","author":"B Efron","year":"1994","unstructured":"Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. CRC Press, Boca Raton (1994)"},{"key":"31_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"31_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H., et al.: Introduction to Information Retrieval, vol. 1. Cambridge University Press, Cambridge (2008)"},{"key":"31_CR24","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1214\/aos\/1021379865","volume":"30","author":"M Salibian-Barrera","year":"2002","unstructured":"Salibian-Barrera, M., Zamar, R.H.: Bootstrapping robust estimates of regression. Ann. Stat. 30, 556\u2013582 (2002)","journal-title":"Ann. Stat."}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31750-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T18:03:42Z","timestamp":1748887422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31750-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319317496","9783319317502"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31750-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"12 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}