{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T17:05:11Z","timestamp":1742403911090},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717003"},{"type":"electronic","value":"9783540717010"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71701-0_11","type":"book-chapter","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T15:31:38Z","timestamp":1182353498000},"page":"84-95","source":"Crossref","is-referenced-by-count":18,"title":["Deriving Private Information from Arbitrarily Projected Data"],"prefix":"10.1007","author":[{"given":"Songtao","family":"Guo","sequence":"first","affiliation":[]},{"given":"Xintao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Agrawal, C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the 20th Symposium on Principles of Database Systems (2001)","DOI":"10.1145\/375551.375602"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/342009.335438","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Dallas, Texas, May 2000, pp. 439\u2013450. ACM, New York (2000)"},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1162\/089976699300016863","volume":"11","author":"J. Cardoso","year":"1999","unstructured":"Cardoso, J.: High-order contrasts for independent component analysis. Neural Computation\u00a011(1), 157\u2013192 (1999)","journal-title":"Neural Computation"},{"key":"11_CR4","volume-title":"Proceedings of the 5th IEEE International Conference on Data Mining","author":"K. Chen","year":"2005","unstructured":"Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proceedings of the 5th IEEE International Conference on Data Mining, Houston,TX, Nov. 2005, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"11_CR5","volume-title":"Proceedings of the 21st ACM Symposium on Applied Computing","author":"S. Guo","year":"2006","unstructured":"Guo, S., Wu, X.: On the use of spectral filtering for privacy preserving data mining. In: Proceedings of the 21st ACM Symposium on Applied Computing, Dijion, France, April 2006, ACM, New York (2006)"},{"key":"11_CR6","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","DOI":"10.1007\/11871637_51","volume-title":"Knowledge Discovery in Databases: PKDD 2006","author":"S. Guo","year":"2006","unstructured":"Guo, S., Wu, X., Li, Y.: On the lower bound of reconstruction error for spectral filting based privacy preserving data mining. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol.\u00a04213, Springer, Heidelberg (2006)"},{"key":"11_CR7","volume-title":"Proceedings of the ACM SIGMOD Conference on Management of Data","author":"Z. Huang","year":"2005","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the ACM SIGMOD Conference on Management of Data, Baltimore, MA, ACM Press, New York (2005)"},{"key":"11_CR8","doi-asserted-by":"crossref","DOI":"10.1002\/0471221317","volume-title":"Independent Component Analysis","author":"A. Hyvarinen","year":"2001","unstructured":"Hyvarinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. John Wiley & Sons, Chichester (2001)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Kargupta, H., et al.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the 3rd International Conference on Data Mining, pp. 99\u2013106 (2003)","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"11_CR10","series-title":"Lecture Notes in Artificial Intelligence","volume-title":"Knowledge Discovery in Databases: PKDD 2006","author":"K. Liu","year":"2006","unstructured":"Liu, K., Giannella, C., Kargupta, H.: An attacker\u2019s view of distance preserving maps for privacy preserving data mining. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol.\u00a04213, Springer, Heidelberg (2006)"},{"issue":"1","key":"11_CR11","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K. Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random projection based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transaction on Knowledge and Data Engineering\u00a018(1), 92\u2013106 (2006)","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"issue":"10","key":"11_CR12","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1287\/mnsc.45.10.1399","volume":"45","author":"K. Muralidhar","year":"1999","unstructured":"Muralidhar, K., Sarathy, R.: A general additive data perturbation method for database security. Management Science\u00a045(10), 1399\u20131415 (1999)","journal-title":"Management Science"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Oliveira, S., Zaiane, O.: Achieving privacy preservation when sharing data for clustering. In: Proceedings of the Workshop on Secure Data Management in a Connected World, Toronto, Canada, August 2004, pp. 67\u201382 (2004)","DOI":"10.1007\/978-3-540-30073-1_6"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71701-0_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:25:04Z","timestamp":1605763504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71701-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717003","9783540717010"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71701-0_11","relation":{},"subject":[]}}