{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:54:20Z","timestamp":1725569660724},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173158"},{"type":"electronic","value":"9783642173165"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17316-5_21","type":"book-chapter","created":{"date-parts":[[2010,11,11]],"date-time":"2010-11-11T19:19:48Z","timestamp":1289503188000},"page":"226-237","source":"Crossref","is-referenced-by-count":0,"title":["Discord Region Based Analysis to Improve Data Utility of Privately Published Time Series"],"prefix":"10.1007","author":[{"given":"Shuai","family":"Jin","sequence":"first","affiliation":[]},{"given":"Yubao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhijie","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","first-page":"487","volume-title":"Privacy-Preserving Data Mining Models and Algorithms","author":"X. Yabo","year":"2008","unstructured":"Yabo, X., Ke, W., Ada, W.C.F., Rong, S., Jian, P.: Privacy-Preserving Data Stream Classification. In: Charu, A., Philip, S.Y. (eds.) Privacy-Preserving Data Mining Models and Algorithms, pp. 487\u2013510. Springer, Heidelberg (2008)"},{"key":"21_CR2","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-540-68125-0_42","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Z. Ye","year":"2008","unstructured":"Ye, Z., Yongjian, F., Huirong, F.: On Privacy in Time Series Data Mining. In: Washio, T., Suzuki, E., Ting, K.M., Inokuchi, A. (eds.) PAKDD 2008. LNCS (LNAI), vol.\u00a05012, pp. 479\u2013493. Springer, Heidelberg (2008)"},{"key":"21_CR3","series-title":"Lecture Notes in Artificial Intelligence","first-page":"318","volume-title":"Advances in Data Mining. Theoretical Aspects and Applications","author":"C.S. Josenildo","year":"2007","unstructured":"Josenildo, C.S., Matthias, K.: Privacy-preserving discovery of frequent patterns in time series. In: Perner, P. (ed.) ICDM 2007. LNCS (LNAI), vol.\u00a04597, pp. 318\u2013328. Springer, Heidelberg (2007)"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1016\/j.ins.2009.01.024","volume":"179","author":"J. Nin","year":"2009","unstructured":"Nin, J., Torra, V.: Towards the evaluation of time series protection methods. Information Science\u00a0179, 1663\u20131677 (2009)","journal-title":"Information Science"},{"key":"21_CR5","first-page":"686","volume-title":"23rd International Conference on Data Engineering","author":"L. Feifei","year":"2007","unstructured":"Feifei, L., Sun, J., Papadimitriou, S., Mihaila, G., Stanoi, I.: Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking. In: 23rd International Conference on Data Engineering, pp. 686\u2013695. IEEE, Los Alamitos (2007)"},{"key":"21_CR6","first-page":"459","volume-title":"33rd International Conference on Very Large Data Bases","author":"S. Papadimitriou","year":"2007","unstructured":"Papadimitriou, S., Feifei, L., Kollios, G., Philip, S.Y.: Time series compressibility and privacy. In: 33rd International Conference on Very Large Data Bases, pp. 459\u2013470. ACM, New York (2007)"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010, 571\u2013588 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/978-3-642-00672-2_62","volume-title":"Advances in Data and Web Management","author":"L. Yubao","year":"2009","unstructured":"Yubao, L., Xiuwei, C., Fei, W., Jian, Y.: Efficient Detection of Discords for Time Series Stream. In: Li, Q., Feng, L., Pei, J., Wang, S.X., Zhou, X., Zhu, Q.-M. (eds.) APWeb\/WAIM 2009. LNCS, vol.\u00a05446, pp. 629\u2013634. Springer, Heidelberg (2009)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 36\u201354. Springer, Heidelberg (2000)"},{"key":"21_CR10","first-page":"439","volume-title":"ACM SIGMOD International Conference on Management of Data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Aggarwal, C.C.: Privacy preserving data mining. In: ACM SIGMOD International Conference on Management of Data, pp. 439\u2013450. ACM, New York (2000)"},{"key":"21_CR11","doi-asserted-by":"crossref","first-page":"1033","DOI":"10.1145\/1143844.1143974","volume-title":"International Conference on Machine Learning","author":"X. Xi","year":"2006","unstructured":"Xi, X., Keogh, E., Shelton, C., Wei, L., Ratanamahatana, C.: Fast time series classification using numerosity reduction. In: International Conference on Machine Learning, pp. 1033\u20131040. ACM, New York (2006)"},{"key":"21_CR12","first-page":"217","volume-title":"ACM SIGMOD International Conference on Management of Data","author":"D. Kifer","year":"2006","unstructured":"Kifer, D., Gehrke, J.: Injecting utility into anonymized datasets. In: ACM SIGMOD International Conference on Management of Data, pp. 217\u2013228. ACM, New York (2006)"},{"key":"21_CR13","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/773153.773174","volume-title":"ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems","author":"A. Evfimievski","year":"2003","unstructured":"Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 211\u2013222. ACM, New York (2003)"},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/91.366565","volume":"3","author":"S. Abe","year":"1995","unstructured":"Abe, S., Lan, M.S.: A method for fuzzy rules extraction directly from numerical data and its application to pattern classification. IEEE Trans. Fuzzy Systems\u00a03, 18\u201328 (1995)","journal-title":"IEEE Trans. Fuzzy Systems"},{"key":"21_CR15","first-page":"205","volume-title":"21st International Conference on Data Engineering","author":"C.M.F. Benjamin","year":"2005","unstructured":"Benjamin, C.M.F., Ke, W., Philip, S.Y.: Top-Down Specialization for Information and Privacy Preservation. In: 21st International Conference on Data Engineering, pp. 205\u2013216. IEEE Computer Society, Los Alamitos (2005)"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/11818175_30","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"D. Ivan","year":"2006","unstructured":"Ivan, D., Yuval, I.: Scalable Secure Multiparty Computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 501\u2013520. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17316-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T07:14:26Z","timestamp":1636787666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17316-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642173158","9783642173165"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17316-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}