{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:07:12Z","timestamp":1750997232721,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319687582"},{"type":"electronic","value":"9783319687599"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68759-9_55","type":"book-chapter","created":{"date-parts":[[2017,10,13]],"date-time":"2017-10-13T02:33:42Z","timestamp":1507862022000},"page":"684-693","source":"Crossref","is-referenced-by-count":1,"title":["A New Method for Constructing Ensemble Classifier in Privacy-Preserving Distributed Environment"],"prefix":"10.1007","author":[{"given":"Yan","family":"Shao","sequence":"first","affiliation":[]},{"given":"Zhanjun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"issue":"2","key":"55_CR1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/772862.772867","volume":"4","author":"C Clifton","year":"2002","unstructured":"Clifton, C., Kantarcioglou, M., Lin, X., Zhu, M.: Tools for privacy-preserving distributed data mining. ACM SIGKDD Explor. 4(2), 28\u201334 (2002)","journal-title":"ACM SIGKDD Explor."},{"issue":"4","key":"55_CR2","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1587\/transinf.E97.D.876","volume":"97-D","author":"C Sun","year":"2014","unstructured":"Sun, C., Gao, H., Zhou, J., Hu, Y., She, L.: A new hybrid approach for privacy preserving distributed data mining. IEICE Trans. Inf. Syst. 97-D(4), 876\u2013883 (2014)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"55_CR3","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1016\/j.asoc.2015.06.060","volume":"36","author":"H Bhuyan","year":"2015","unstructured":"Bhuyan, H., Kamila, N.: Privacy preserving sub-feature selection in distributed data mining. Appl. Soft Comput. 36, 552\u2013569 (2015)","journal-title":"Appl. Soft Comput."},{"issue":"8","key":"55_CR4","doi-asserted-by":"crossref","first-page":"1847","DOI":"10.1109\/TIFS.2016.2561241","volume":"11","author":"L Li","year":"2016","unstructured":"Li, L., Lu, R., Choo, K., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847\u20131861 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"55_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-0-387-70992-5_2","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms","author":"C Aggarwal","year":"2008","unstructured":"Aggarwal, C., Yu, P.: A general survey of privacy-preserving data ming models and algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, pp. 11\u201352. Springer, Boston (2008). doi: 10.1007\/978-0-387-70992-5_2"},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Xiao, M., Huang, L., Shen, H., Luo, Y.: Privacy preserving ID3 algorithm over horizontally partitioned data. In: The 6th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), pp. 239\u2013243 (2005)","DOI":"10.1109\/PDCAT.2005.191"},{"key":"55_CR7","doi-asserted-by":"crossref","unstructured":"Xiao, M., Han, K., Huang, L., Li, J.: Privacy preserving C4.5 algorithm over horizontally partitioned data. In: Proceedings of the Fifth International Conference on Grid and Cooperative Computing, pp. 78\u201385 (2006)","DOI":"10.1109\/GCC.2006.73"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Samet, S., Miri, A.: Privacy preserving ID3 using Gini index over horizontally partitioned data. In: ACS\/IEEE International Conference on Computer Systems and Applications, pp. 645\u2013651 (2008)","DOI":"10.1109\/AICCSA.2008.4493598"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Jin, Y., Su, C., Ruan, N., Jia, W.: Privacy-preserving mining of association rules for horizontally distributed databases based on FP-tree. In: 12th International Conference on Information Security Practice and Experience, pp. 300\u2013314 (2016)","DOI":"10.1007\/978-3-319-49151-6_21"},{"issue":"10","key":"55_CR10","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1109\/TNN.2009.2026902","volume":"20","author":"T Chen","year":"2009","unstructured":"Chen, T., Zhong, S.: Privacy preserving back propagation neural network learning. IEEE Trans. Neural Netw. 20(10), 1554\u20131564 (2009)","journal-title":"IEEE Trans. Neural Netw."},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"Huai, M., Huang, L., Yang, W., Li, L., Qi, M.: Privacy-preserving naive Bayes classification. In: The 8th International Conference on Knowledge Science, Engineering and Management, pp. 627\u2013638 (2015)","DOI":"10.1007\/978-3-319-25159-2_57"},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"Yu, H., Jiang, X., Vaidya, J.: Privacy preserving SVM using nonlinear kernels on horizontally partitioned data. In: Proceedings of the 2006 ACM Symposium on Applied Computing, SAC 2006, pp. 603\u2013610. ACM Press, New York (2006)","DOI":"10.1145\/1141277.1141415"},{"key":"55_CR13","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-0-387-70992-5_13","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms","author":"M Kantarcioglou","year":"2008","unstructured":"Kantarcioglou, M.: A survey of privacy-preserving methods across horizontally partitioned data. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, pp. 311\u2013335. Springer, Boston (2008). doi: 10.1007\/978-0-387-70992-5_13"},{"key":"55_CR14","doi-asserted-by":"crossref","unstructured":"Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. In: IACR Cryptology ePrint Archive (2008)","DOI":"10.29012\/jpc.v1i1.566"},{"key":"55_CR15","doi-asserted-by":"crossref","unstructured":"Yao, A.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"55_CR16","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1201\/b12207","volume-title":"Ensemble Methods Foundations and Algorithms","author":"Z Zhou","year":"2012","unstructured":"Zhou, Z.: Ensemble Methods Foundations and Algorithms, pp. 15\u201317. CRC, Boca Raton (2012)"},{"issue":"1","key":"55_CR17","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s10618-006-0051-9","volume":"14","author":"S Gambs","year":"2007","unstructured":"Gambs, S., K\u00e9gl, B., A\u00cfmeur, E.: Privacy-preserving boosting. Data Mining Knowl. Discov. 14(1), 131\u2013170 (2007)","journal-title":"Data Mining Knowl. Discov."},{"key":"55_CR18","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.ins.2015.10.011","volume":"330","author":"Y Li","year":"2016","unstructured":"Li, Y., Bai, C., Reddy, C.: A distributed ensemble approach for mining healthcare data under privacy constraints. Inf. Sci. 330, 245\u2013259 (2016)","journal-title":"Inf. Sci."},{"key":"55_CR19","doi-asserted-by":"crossref","unstructured":"Xie, L., Plis, S., Sarwate, A.: Data-weighted ensemble learning for privacy-preserving distributed learning. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2309\u20132313 (2016)","DOI":"10.1109\/ICASSP.2016.7472089"},{"key":"55_CR20","doi-asserted-by":"crossref","unstructured":"Kantarcioglou, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 599\u2013604 (2004)","DOI":"10.1145\/1014052.1014126"}],"container-title":["Lecture Notes in Computer Science","Simulated Evolution and Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68759-9_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T13:06:58Z","timestamp":1750943218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68759-9_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319687582","9783319687599"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68759-9_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}