{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:32:03Z","timestamp":1725881523654},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_14","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T02:13:45Z","timestamp":1488420825000},"page":"139-149","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Preserving Data Mining: A Parametric Analysis"],"prefix":"10.1007","author":[{"given":"Darshana","family":"Patel","sequence":"first","affiliation":[]},{"given":"Radhika","family":"Kotecha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"14_CR1","unstructured":"P. Tan, M. Steinbach, V. Kumar, Introduction to Data Mining, 1st edn. (Addison Wesley Longman Publishing, Co. Inc., 2005)"},{"key":"14_CR2","unstructured":"J. Panackal, A. Pillai, Privacy preserving data mining: an extensive survey, in ACEEE, Proceedings of International Conference on Multimedia Processing, Communication and Information Technology (2013)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"M. Dhanalakshmi, S. Sankari, Privacy preserving data mining techniques-survey, in Proceedings of information communication & embedded systems (2014)","DOI":"10.1109\/ICICES.2014.7033869"},{"key":"14_CR4","unstructured":"K. Babu, Utility-Based Privacy Preserving Data Publishing. Ph.D. thesis, National Institute of Technology Rourkela (2013)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"X. Ge, J. Zhu, New Fundamental Technologies in Data Mining, ch. Privacy preserving data mining (In Tech Publishing, 2011)","DOI":"10.5772\/13364"},{"key":"14_CR6","unstructured":"S. Gokila, P. Venkateswari, A survey on privacy preserving data publishing. Int. J. Cybern. Inf. 3(1) (2014)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"C. Aggarwal, P. Yu, Advances in Database Systems, ch. A general survey of privacy-preserving data mining models and algorithms (Springer, 2008)","DOI":"10.1007\/978-0-387-70992-5"},{"key":"14_CR8","unstructured":"G. Nayak, S. Devi, A survey on privacy preserving data mining: approaches and techniques. Int. J. Eng. Sci. Technol. (2011)"},{"key":"14_CR9","unstructured":"V. A-Rivera, P. McDonagh, T. Cerqueus, L. Murphy, A systematic comparison and evaluation of k-anonymization algorithms for practitioners. Trans. Data Privacy, 337\u2013370 (2014)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"P. Samarati, Protecting Respondents\u2019 identities in Microdata Release. IEEE Trans. Knowl. Data Eng. (2001)","DOI":"10.1109\/69.971193"},{"issue":"5","key":"14_CR11","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"L. Sweeney, Achieving K-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 571\u2013588 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"R. Brand, Microdata protection through noise addition, in Inference Control in Statistical Databases. Lecture Notes in Computer Science, vol. 2316, pp. 97\u2013116 (2002)","DOI":"10.1007\/3-540-47804-3_8"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"X. Xiao, Y. Tao Anatomy: simple and effective privacy preservation, in Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 139\u2013150 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"J. D-Ferrer, V. Torra Ordinal, continuous and heterogeneous k-anonymity through Microaggregation, in Data Mining Knowledge Discovery, vol. 11, no. 2 (2005)","DOI":"10.1007\/s10618-005-0007-5"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"P. Samarati, L. Sweeney, Generalizing data to provide anonymity when disclosing information, in Proceedings of ACM Symposium on Principles of Database Systems (1998)","DOI":"10.1145\/275487.275508"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"C. Aggarwal, P. Yu, Advances in Database Systems, ch. A survey of randomization methods for privacy-preserving data mining (Springer, 2008)","DOI":"10.1007\/978-0-387-70992-5"},{"issue":"3","key":"14_CR17","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y Lindell","year":"2002","unstructured":"Y. Lindell, B. Pinkas, Privacy preserving data mining. J. Cryptol. 15(3), 177\u2013206 (2002)","journal-title":"J. Cryptol."},{"key":"14_CR18","unstructured":"L. Vasudevan, D. Sukanya, N. Aarthi, Privacy preserving data mining using cryptographic role based access control approach, in Proceedings of the International Multi-Conference of Engineers and Computer Scientists, Hong Kong, pp. 19\u201321 (2008)"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"B. Fung, K. Wang, R. Chen, P. Yu, Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4) (2010)","DOI":"10.1145\/1749603.1749605"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"R. Kotecha, S. Garg, Data streams and privacy: two emerging issues in data classification, in Nirma University International Conference on Engineering (IEEE, 2015)","DOI":"10.1109\/NUICONE.2015.7449597"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"K. Saranya, K. Premalatha, S. Rajasekar, A survey on privacy preserving data mining, in International Conference on Electronics & Communication System (IEEE, 2015)","DOI":"10.1109\/ECS.2015.7124885"},{"key":"14_CR22","unstructured":"J. Han, M. Kamber, Data Mining: Concepts and Techniques (Morgan Kaufmann Publishers Inc., 2005)"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"R. Kotecha, V. Ukani, S. Garg, An empirical analysis of multiclass classification techniques in data mining, in Nirma University International Conference on Engineering (IEEE, 2011)","DOI":"10.1109\/NUiConE.2011.6153244"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T08:37:05Z","timestamp":1692693425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}