{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:33:07Z","timestamp":1725593587234},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642315992"},{"type":"electronic","value":"9783642316005"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-31600-5_34","type":"book-chapter","created":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T14:58:37Z","timestamp":1348239517000},"page":"347-355","source":"Crossref","is-referenced-by-count":2,"title":["An Intensified Approach for Privacy Preservation in Incremental Data Mining"],"prefix":"10.1007","author":[{"given":"V.","family":"Rajalakshmi","sequence":"first","affiliation":[]},{"given":"G. S.","family":"Anandha Mala","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Gitanjali, J., Indumathi, J., Sriman Narayana Iyengar, N.C.: A Pristine Clean Cabalistic Foruity Strategize Based Approach for Incremental Data Stream Privacy Preserving Data Mining. In: 2010 IEEE 2nd International Advance Computing Conference, pp. 410\u2013415 (2010)","DOI":"10.1109\/IADCC.2010.5422918"},{"key":"34_CR2","unstructured":"Rasheed, F., Lee, Y.-K., Lee, S.: In: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE (2006)"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Patra, B.K., Nandi, S., Viswanath, P.: Data summarization based fast hierarchical clustering method for large datasets. In: 2009 International Conference on Information Management and Engineering, pp. 278\u2013282 (2009)","DOI":"10.1109\/ICIME.2009.65"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Yang, C.-H., Yang, D.-L.: IMBT - A Binary Tree for Efficient Support Counting of Incremental Data Mining. In: International Conference on Computational Science and Engineering (2009)","DOI":"10.1109\/CSE.2009.360"},{"key":"34_CR5","unstructured":"Bradley, P.S., Fayyad, U.M., Reina, C.: Scaling clustering algorithms to large databases. In: KDD, pp. 9\u201315 (1998)"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Altiparmak, F., Ferhatosmanoglu, H.: Incremental Maintenance of Online Summaries over Multiple Streams. IEEE Transactions on Knowledge and Data Engineering\u00a020(2) (February 2008)","DOI":"10.1109\/TKDE.2007.190693"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Dai, B.-R., Chiang, L.-H.: IEEE Hiding Frequent Patterns in the Updated Database (2010)","DOI":"10.1109\/ICISA.2010.5480385"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Yubo, J., Yuntao, D., Yongli, W.: An Incremental Updating Algorithm for Online Mining Association Rules. In: 2009 International Conference on Web Information Systems and Mining (2009)","DOI":"10.1109\/WISM.2009.37"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Jin, H., Leung, K.-S.: Scalable Model-Based Clustering for Large Databases Based on Data Summarization. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a027(11) (November 2005)","DOI":"10.1109\/TPAMI.2005.226"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Han, S., Ng, W.K., Wan, L.: Privacy-Preserving Gradient Descent Methods. IEEE Transactions on Knowledge and Data Engineering (March 2010)","DOI":"10.1109\/TKDE.2009.153"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Wu, X., Wu, G.-Q., Xie, F., Zhu, Z., Hu, X.-G., Lu, H., Li, H.: News Filtering and Summarization on the Web Intelligent Systems, vol.\u00a025(5). IEEE (September-October 2010)","DOI":"10.1109\/MIS.2010.11"},{"key":"34_CR12","unstructured":"Bulut, A., Singh, A.K.: SWAT: hierarchical stream summarization in large networks. In: Proceedings of 19th International Conference on Data Engineering (March 2003)"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Bingham, E., Mannila, H.: Random projection in dimensionality reduction: applications to image and text data. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, USA, pp. 245\u2013250 (2001)","DOI":"10.1145\/502512.502546"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-Preserving Association Rule Mining in Vertically Partitioned Data. In: Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (2002)","DOI":"10.1145\/775047.775142"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: In: Proceedings of the ACM SIGMOD Conference on Management of Data, Dallas, TX, pp. 439\u2013450 (May 2000)","DOI":"10.1145\/335191.335438"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Bu, S., Lakshmanan, L., Ng, R., Ramesh, G.: Preservation of Patterns and Input-Output Privacy. In: Proc. IEEE 23rd Int\u2019l Conf. Data Eng., pp. 696\u2013705 (April 2007)","DOI":"10.1109\/ICDE.2007.367915"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., Yu, P.: Privacy-Preserving Data Mining: Models and Algorithms. Springer (2008)","DOI":"10.1007\/978-0-387-70992-5"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Fong, P.K., Weber-Jahnke, J.H.: Privacy Preserving Decision Tree Learning Using Unrealized Data Sets. IEEE Transactions on Knowledge and Data Engineering\u00a024(2) (February 2012)","DOI":"10.1109\/TKDE.2010.226"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.: On the Design and Quantification of Privacy- Preserving Data Mining Algorithms. In: ACM PODS Conference (2002)","DOI":"10.1145\/375551.375602"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Computing and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31600-5_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:15:41Z","timestamp":1620130541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31600-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642315992","9783642316005"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31600-5_34","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}