{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:05:08Z","timestamp":1742915108201,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811064265"},{"type":"electronic","value":"9789811064272"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6427-2_46","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T06:32:16Z","timestamp":1506148336000},"page":"582-591","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Privacy Preserving Data Publishing Techniques for Various Feature Selection Stability Measures"],"prefix":"10.1007","author":[{"given":"Mohana Chelvan","family":"P.","sequence":"first","affiliation":[]},{"given":"Perumal","family":"K.","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"46_CR1","first-page":"835","volume-title":"Handbook of Statistics","author":"AK Jain","year":"1982","unstructured":"Jain, A.K., Chandrasekaran, B.: Dimensionality and sample size considerations in pattern recognition practice. In: Krishnaiah, P.R., Kanal, L.N. (eds.) Handbook of Statistics, pp. 835\u2013855. North-Holland Publishing Company, Amsterdam (1982)"},{"key":"46_CR2","doi-asserted-by":"publisher","unstructured":"Alelyani, S., Liu, H.: The effect of the characteristics of the dataset on the selection stability. In: International Conference on Tools with Artificial Intelligence. IEEE (2011). doi:\n10.1109\/ICTAI.2011.167\n\n. \nhttp:\/\/ieeexplore.ieee.org\/document\/6103458\n\n. 1082-3409\/11","DOI":"10.1109\/ICTAI.2011.167"},{"key":"46_CR3","doi-asserted-by":"publisher","unstructured":"Alelyani, S., Zhao, Z., Liu, H.: A dilemma in assessing stability of feature selection algorithms. In: International Conference on High Performance Computing and Communications. IEEE (2011). doi:\n10.1109\/HPCC.2011.99\n\n. \nhttp:\/\/ieeexplore.ieee.org\/document\/6063062\n\n. 978-0-7695-4538-7\/11","DOI":"10.1109\/HPCC.2011.99"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkita Subramanian, M.: \u2113-diversity: privacy beyond k-anonymity. In: Proceedings of the International conference on Data Engineering (ICDE), p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"46_CR5","unstructured":"Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st VLDB Conference, Trondheim, Norway, pp. 901\u2013909 (2005)"},{"issue":"8","key":"46_CR6","first-page":"28","volume":"1","author":"A Prakash","year":"2012","unstructured":"Prakash, A., Mogili, R.: Privacy preservation measure using t-closeness with combined l-diversity and k-anonymity. Int. J. Adv. Res. Comput. Sci. Electron. Eng. (IJARC SEE) 1(8), 28\u201333 (2012)","journal-title":"Int. J. Adv. Res. Comput. Sci. Electron. Eng. (IJARC SEE)"},{"issue":"3","key":"46_CR7","first-page":"561","volume":"24","author":"T Li","year":"2012","unstructured":"Li, T., Zhang, J., Molloy, I.: Slicing: a new approach for privacy preserving data publishing. IEEE Trans. KDD 24(3), 561\u2013574 (2012)","journal-title":"IEEE Trans. KDD"},{"key":"46_CR8","unstructured":"Kuncheva, L.I.: A stability index for feature selection. In: Proceedings of the 25th Conference on IASTED International Multi conference: Artificial Intelligence and Applications, Anaheim, CA, USA, pp. 390\u2013395. ACTA Press (2007)"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Yu, L., Ding, C., Loscalzo, S.: Stable feature selection via dense feature groups. In: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008, New York, NY, USA, pp. 803\u2013811. ACM (2008)","DOI":"10.1145\/1401890.1401986"},{"key":"46_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-540-87481-2_21","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"Y Saeys","year":"2008","unstructured":"Saeys, Y., Abeel, T., Van de Peer, Y.: Robust feature selection using ensemble feature selection techniques. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008. LNCS, vol. 5212, pp. 313\u2013325. Springer, Heidelberg (2008). doi:\n10.1007\/978-3-540-87481-2_21"},{"issue":"1","key":"46_CR11","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10115-006-0040-8","volume":"12","author":"A Kalousis","year":"2007","unstructured":"Kalousis, A., Prados, J., Hilario, M.: Stability of feature selection algorithms: a study on high-dimensional spaces. Knowl. Inf. Syst. 12(1), 95\u2013116 (2007). \nhttp:\/\/link.springer.com\/article\/10.1007\/s10115-006-0040-8","journal-title":"Knowl. Inf. Syst."},{"issue":"6","key":"46_CR12","first-page":"63","volume":"7","author":"K Sudha","year":"2015","unstructured":"Sudha, K., Jebamalar Tamilselvi, J.: A review of feature selection algorithms for data mining techniques. Int. J. Comput. Sci. Eng. (IJCSE) 7(6), 63\u201367 (2015). ISSN 0975-3397","journal-title":"Int. J. Comput. Sci. Eng. (IJCSE)"},{"key":"46_CR13","unstructured":"Mani, K., Kalpana, P.: A review on filter based feature selection. Int. J. Innovative Res. Comput. Commun. Eng. (IJIRCCE) 4(5) (2016)"},{"key":"46_CR14","unstructured":"Hall, M.A.: Correlation-based feature selection for machine learning. Deptartment of Computer science, University of Waikato (1998). \nhttp:\/\/www.cs.waikato.ac.nz\/mhall\/thesis.pdf"},{"key":"46_CR15","unstructured":"Frank, A., Asuncion, A.: UCI Machine Learning Repository. School of Information and Computer Science, University of California, Irvine, CA (2010). \nhttp:\/\/archive.ics.uci.edu\/ml"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6427-2_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T01:38:17Z","timestamp":1517189897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6427-2_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064265","9789811064272"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6427-2_46","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}