{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:26Z","timestamp":1725516266881},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540787327"},{"type":"electronic","value":"9783540787334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-78733-4_20","type":"book-chapter","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T19:58:56Z","timestamp":1218657536000},"page":"331-340","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-Preserving Data Mining for Medical Data: Application of Data Partition Methods"],"prefix":"10.1007","author":[{"given":"Yi","family":"Peng","sequence":"first","affiliation":[]},{"given":"Gang","family":"Kou","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Zhengxin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1_1","doi-asserted-by":"crossref","unstructured":"D. Agrawal and C. C. Aggarwal (2001) On the Design and Quantification of Privacy Preserving Data Mining Algorithms, Proc. ACM SIGMOD, pp. 247-255.","DOI":"10.1145\/375551.375602"},{"key":"20_CR2_1","doi-asserted-by":"crossref","unstructured":"R. Agrawal and R. Srikant (2000) Privacy-Preserving Data Mining, Proc. of the ACM SIGMOD Conference on Management of Data.","DOI":"10.1145\/342009.335438"},{"key":"20_CR3_1","doi-asserted-by":"crossref","unstructured":"K. P. Bennett & O. L. Mangasarian (1992) Robust linear programming discrimination of two linearly inseparable sets, Optimization Methods and Software 1, 23-34, Gordon & Breach Science Publishers.","DOI":"10.1080\/10556789208805504"},{"issue":"1\u20132","key":"20_CR4_1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0933-3657(02)00049-0","volume":"26","author":"KJ Cios","year":"2002","unstructured":"K. J. Cios & G. W. Moore (2002) Uniqueness of medical data mining, Artificial Intelligence in Medicine, Vol. 26, Issue 1\u20132, 1\u201324.","journal-title":"Artificial Intelligence in Medicine"},{"key":"20_CR5_1","first-page":"19","volume-title":"Privacy, Security, and Data Mining, presented at the combined conference 13th European Conference on Machine Learning (ECML\u201902) and 6th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD\u201902)","author":"C Clifton","year":"2002","unstructured":"C. Clifton (2002) Privacy, Security, and Data Mining, presented at the combined conference 13th European Conference on Machine Learning (ECML\u201902) and 6th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD\u201902), Helsinki, Finland, pp. 19-23."},{"key":"20_CR6_1","first-page":"1","volume-title":"Ensemble methods in machine learning. First international workshop on multiple classifier systems","author":"TG Dietterich","year":"2000","unstructured":"T.G. Dietterich (2000) Ensemble methods in machine learning. First international workshop on multiple classifier systems, Springer Verlag, New York, pp. 1-15."},{"issue":"9","key":"20_CR7_1","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","volume":"16","author":"M Kantarcioglu","year":"2004","unstructured":"M. Kantarcioglu and C. Clifton (2004) Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data, IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026-1037.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"20_CR8_1","unstructured":"J. Kim (2002) Ensemble methods for data mining, Probability and data mining lab, Feb 4, 2002, Available online: \n                    http:\/\/srccs.snu.ac.kr\/VerII\/Activity\/Tutorial\/ensemble.pdf"},{"key":"20_CR9_1","doi-asserted-by":"crossref","unstructured":"Y. Lindell and B. Pinkas (2002) Privacy Preserving Data Mining, Journal of Cryptology, Volume 15, Number 3, pp. 177-206, Springer New York.","DOI":"10.1007\/s00145-001-0019-2"},{"key":"20_CR10_1","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1613\/jair.614","volume":"11","author":"D Opitz","year":"1999","unstructured":"D. Opitz and R. Maclin (1999) Popular ensemble methods: an empirical a) study, Journal of Artificial Intelligence Research 11, pp. 169-198.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"20_CR11_1","unstructured":"Rulequest Research (2003) Retrieved April 29, 2006, from \n                    http:\/\/www.rulequest.com\/see5-info.html\n                    \n                  ."},{"key":"20_CR12_1","unstructured":"UCI Machine Learning repository (2006) Retrieved April 29, 2006, from a) \n                    http:\/\/www.ics.uci.edu\/~mlearn\/databases\n                    \n                  \/"},{"key":"20_CR13_1","doi-asserted-by":"crossref","unstructured":"J. Vaidya and C. Clifton (2002) Privacy preserving association rule mining in vertically partitioned data, Proceedings of the eighth ACM SIGKDD, pp. 639 \u2013 644.","DOI":"10.1145\/775047.775142"},{"issue":"1","key":"20_CR14_1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"3","author":"VS Verykios","year":"2004","unstructured":"V.S. Verykios, E. Bertino, I.N. Fovino, L.P. Provenza, Y. Saygin, and Y. Theodoridis (2004) State-of-the-Art in Privacy Preserving Data Mining, ACM SIGMOD Record, vol. 3, no. 1, pp. 50-57.","journal-title":"ACM SIGMOD Record"},{"key":"20_CR15_1","doi-asserted-by":"publisher","first-page":"9193","DOI":"10.1073\/pnas.87.23.9193","volume":"87","author":"WH Wolberg","year":"1990","unstructured":"W. H. Wolberg and O.L. Mangasarian (1990) Multisurface method of pattern separation for medical diagnosis applied to breast cytology, Proceedings of the National Academy of Sciences, U.S.A., Volume 87, December 1990, pp. 9193-9196.","journal-title":"Proceedings of the National Academy of Sciences, U.S.A."},{"key":"20_CR16_1","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/3-540-46119-1_32","volume":"2416","author":"G Zenobi","year":"2002","unstructured":"G. Zenobi and P. Cunningham (2002) An Approach to Aggregating Ensembles of Lazy Learners That Supports Explanation, Lecture Notes in Computer Science, Vol. 2416, pp. 436-447.","journal-title":"Lecture Notes in Computer Science"}],"container-title":["Studies in Computational Intelligence","Communications and Discoveries from Multidisciplinary Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78733-4_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:20:37Z","timestamp":1619508037000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78733-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540787327","9783540787334"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78733-4_20","relation":{},"ISSN":["1860-949X"],"issn-type":[{"type":"print","value":"1860-949X"}],"subject":[],"published":{"date-parts":[[2008]]}}}