{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:03:30Z","timestamp":1775912610702,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642334856","type":"print"},{"value":"9783642334863","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33486-3_3","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T16:39:17Z","timestamp":1347295157000},"page":"35-50","source":"Crossref","is-referenced-by-count":405,"title":["Fairness-Aware Classifier with Prejudice Remover Regularizer"],"prefix":"10.1007","author":[{"given":"Toshihiro","family":"Kamishima","sequence":"first","affiliation":[]},{"given":"Shotaro","family":"Akaho","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Asoh","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Sakuma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Yu, P.S. (eds.): Privacy-Preserving Data Mining: Models and Algorithms. Springer (2008)","DOI":"10.1007\/978-0-387-70992-5"},{"key":"3_CR2","unstructured":"Boyd, D.: Privacy and publicity in the context of big data. In: Keynote Talk of The 19th Int\u2019l Conf. on World Wide Web (2010)"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10618-010-0190-x","volume":"21","author":"T. Calders","year":"2010","unstructured":"Calders, T., Verwer, S.: Three naive bayes approaches for discrimination-free classification. Data Mining and Knowledge Discovery\u00a021, 277\u2013292 (2010)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Dai, W., Yang, Q., Xue, G.R., Yu, Y.: Boosting for transfer learning. In: Proc. of the 24th Int\u2019l Conf. on Machine Learning, pp. 193\u2013200 (2007)","DOI":"10.1145\/1273496.1273521"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dwork, C., Hardt, M., Pitassi, T., Reingold, O., Zemel, R.: Fairness through awareness. arxiv.org:1104.3913 (2011)","DOI":"10.1145\/2090236.2090255"},{"key":"3_CR6","unstructured":"Elkan, C.: The foundations of cost-sensitive learning. In: Proc. of the 17th Int\u2019l Joint Conf. on Artificial Intelligence, pp. 973\u2013978 (2001)"},{"key":"3_CR7","volume-title":"UCI machine learning repository","author":"A. Frank","year":"2010","unstructured":"Frank, A., Asuncion, A.: UCI machine learning repository. School of Information and Computer Sciences, University of California, Irvine (2010), http:\/\/archive.ics.uci.edu\/ml"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Gondek, D., Hofmann, T.: Non-redundant data clustering. In: Proc. of the 4th IEEE Int\u2019l Conf. on Data Mining, pp. 75\u201382 (2004)","DOI":"10.1109\/ICDM.2004.10104"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Hyv\u00e4rinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. Wiley-Interscience (2001)","DOI":"10.1002\/0471221317"},{"key":"3_CR10","unstructured":"NIPS workshop \u2014 inductive transfer: 10 years later (2005), http:\/\/iitrl.acadiau.ca\/itws05\/"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kamiran, F., Calders, T., Pechenizkiy, M.: Discrimination aware decision tree learning. In: Proc. of the 10th IEEE Int\u2019l Conf. on Data Mining, pp. 869\u2013874 (2010)","DOI":"10.1109\/ICDM.2010.50"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Kamishima, T., Akaho, S., Sakuma, J.: Fairness-aware learning through regularization approach. In: Proc. of The 3rd IEEE Int\u2019l Workshop on Privacy Aspects of Data Mining, pp. 643\u2013650 (2011)","DOI":"10.1109\/ICDMW.2011.83"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Luong, B.T., Ruggieri, S., Turini, F.: k-NN as an implementation of situation testing for discrimination discovery and prevention. In: Proc. of the 17th Int\u2019l Conf. on Knowledge Discovery and Data Mining, pp. 502\u2013510 (2011)","DOI":"10.1145\/2020408.2020488"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Nissim, K.: Private data analysis via output perturbation. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, ch. 4. Springer (2008)","DOI":"10.1007\/978-0-387-70992-5_16"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Pariser, E.: The Filter Bubble: What The Internet Is Hiding From You. Viking (2011)","DOI":"10.3139\/9783446431164"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Pearl, J.: Causality: Models, Reasoning and Inference, 2nd edn. Cambridge University Press (2009)","DOI":"10.1017\/CBO9780511803161"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Pedreschi, D., Ruggieri, S., Turini, F.: Discrimination-aware data mining. In: Proc. of the 14th Int\u2019l Conf. on Knowledge Discovery and Data Mining (2008)","DOI":"10.1145\/1401890.1401959"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Pedreschi, D., Ruggieri, S., Turini, F.: Measuring discrimination in socially-sensitive decision records. In: Proc. of the SIAM Int\u2019l Conf. on Data Mining, pp. 581\u2013592 (2009)","DOI":"10.1137\/1.9781611972795.50"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Perlich, C., Kaufman, S., Rosset, S.: Leakage in data mining: Formulation, detection, and avoidance. In: Proc. of the 17th Int\u2019l Conf. on Knowledge Discovery and Data Mining, pp. 556\u2013563 (2011)","DOI":"10.1145\/2020408.2020496"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Ruggieri, S., Pedreschi, D., Turini, F.: DCUBE: Discrimination discovery in databases. In: Proc of The ACM SIGMOD Int\u2019l Conf. on Management of Data, pp. 1127\u20131130 (2010)","DOI":"10.1145\/1807167.1807298"},{"key":"3_CR21","first-page":"583","volume":"3","author":"A. Strehl","year":"2002","unstructured":"Strehl, A., Ghosh, J.: Cluster ensembles \u2014 a knowledge reuse framework for combining multiple partitions. Journal of Machine Learning Research\u00a03, 583\u2013617 (2002)","journal-title":"Journal of Machine Learning Research"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Venkatasubramanian, S.: Measures of anonimity. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, ch. 4. Springer (2008)","DOI":"10.1007\/978-0-387-70992-5_4"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"\u017dliobait\u0117, I., Kamiran, F., Calders, T.: Handling conditional discrimination. In: Proc. of the 11th IEEE Int\u2019l Conf. on Data Mining (2011)","DOI":"10.1109\/ICDM.2011.72"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Zadrozny, B.: Learning and evaluating classifiers under sample selection bias. In: Proc. of the 21st Int\u2019l Conf. on Machine Learning, pp. 903\u2013910 (2004)","DOI":"10.1145\/1015330.1015425"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33486-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:33:34Z","timestamp":1744086814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33486-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334856","9783642334863"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33486-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}