{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T01:18:04Z","timestamp":1774142284334,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642137389","type":"print"},{"value":"9783642137396","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_3","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T07:23:50Z","timestamp":1282634630000},"page":"33-48","source":"Crossref","is-referenced-by-count":10,"title":["Understanding Privacy Risk of Publishing Decision Trees"],"prefix":"10.1007","author":[{"given":"Zutao","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE transactions on Knowledge and Data Engineering\u00a013(6) (2001)","DOI":"10.1109\/69.971193"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowlege-Based Systems\u00a010(5) (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Quinlan, J.R.: Induction of decision trees. Machine Learning\u00a01 (1986)","DOI":"10.1007\/BF00116251"},{"key":"3_CR4","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report (1998)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito:efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD, June 12\u201316 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE 2005 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: VLDB 2006 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"3_CR8","unstructured":"Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J.E., Halpern, J.: Worst case background knowledge. In: ICDE 2007 (2007)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD 2000, Dallas, TX USA, May 15\u201318, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: KDD 2002 (2002)","DOI":"10.1145\/775047.775080"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J.E., Kifer, D., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. In: ICDE 2006 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Wong, R.C.W., Li, J., Fu, A.W.C., Wang, K.: (\u03b1, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In: KDD 2006 (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE 2007 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: m-invariance: Towards privacy preserving re-publication of dynamic datasets. In: SIGMOD 2007 (2007)","DOI":"10.1145\/1247480.1247556"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: KDD 2004 (2004)","DOI":"10.1145\/1014052.1014126"},{"key":"3_CR17","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving decision trees over vertically partitioned data"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Wright, R., Yang, Z.: Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In: KDD 2004 (2004)","DOI":"10.1145\/1014052.1014145"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Du, W., Teng, Z., Zhu, Z.: Privacy-MaxEnt: Integrating background knowledge in privacy quantification. In: SIGMOD 2008 (2008)","DOI":"10.1145\/1376616.1376665"},{"key":"3_CR20","unstructured":"Wong, R., Fu, A., Wang, K., Pei, J.: Minimality attack in privacy preserving data publishing. In: VLDB 2007 (2007)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, L., Jajodia, S., Brodsky, A.: Information disclosure under realistic assumptions: Privacy versus optimality. In: CCS 2007 (2007)","DOI":"10.1145\/1315245.1315316"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Wang, G., Du, W.: Deriving private information from association rule mining results. In: ICDE 2009 (2009)","DOI":"10.1109\/ICDE.2009.97"},{"issue":"4","key":"3_CR23","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1103\/PhysRev.106.620","volume":"106","author":"E.T. Jaynes","year":"1957","unstructured":"Jaynes, E.T.: Information theory and statistical mechanics. Physical Review\u00a0106(4), 620\u2013630 (1957)","journal-title":"Physical Review"},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/0-387-30065-1_4","volume-title":"Large-Scale Nonlinear Optimization","author":"R. Byrd","year":"2006","unstructured":"Byrd, R., Nocedal, J., Waltz, R.: Knitro: An integrated package for nonlinear optimization. In: di Pillo, G., Roma, M. (eds.) Large-Scale Nonlinear Optimization, pp. 35\u201359. Springer, Heidelberg (2006)"},{"key":"3_CR25","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Francisco (1993)"},{"key":"3_CR26","unstructured":"Breiman, L., Friedman, J., Stone, C.J., Olshen, R.A.: Classification and Regression Trees. Chapman Hall\/CRC (1984)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T19:54:00Z","timestamp":1685735640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}