{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T19:57:58Z","timestamp":1725998278240},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811318092"},{"type":"electronic","value":"9789811318108"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-1810-8_20","type":"book-chapter","created":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T16:04:59Z","timestamp":1540915499000},"page":"196-207","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Hybrid Approach for Privacy-Preserving Data Mining"],"prefix":"10.1007","author":[{"given":"NagaPrasanthi","family":"Kundeti","sequence":"first","affiliation":[]},{"given":"M. V. P. Chandra Sekhara","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Naga Raju","family":"Devarakonda","sequence":"additional","affiliation":[]},{"given":"Suresh","family":"Thommandru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,31]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Li, X., Yan, Z., Zhang, P.: A review on privacy-preserving datamining. In: IEEE International Conference on Computer and Information Technology (2014)","DOI":"10.1109\/CIT.2014.135"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Langheinrich, M.: Privacy in ubiquitous computing. In: Ubiquitous Computing Fundamentals, pp. 95\u2013159. CRC Press (2009). ch. 3","DOI":"10.1201\/9781420093612.ch3"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/s10115-010-0362-4","volume":"29","author":"K Chen","year":"2010","unstructured":"Chen, K., Liu, L.: Geometric data perturbation for privacy preserving outsourced data mining. Knowl. Inf. Syst. 29, 657\u2013695 (2011)","journal-title":"Knowl. Inf. Syst."},{"issue":"1","key":"20_CR4","first-page":"166","volume":"25","author":"AF Westin","year":"1968","unstructured":"Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1), 166 (1968)","journal-title":"Wash. Lee Law Rev."},{"key":"20_CR5","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-0-387-70992-5_8","volume-title":"Privacy-Preserving Data Mining","author":"E Bertino","year":"2008","unstructured":"Bertino, E., Lin, D., Jiang, W.: A survey of quantification of privacy preserving data mining algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database Systems, vol. 34, pp. 183\u2013205. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5_8"},{"key":"20_CR6","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-0-387-70992-5_2","volume-title":"Privacy-preserving data mining","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Yu, P.S.: A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-preserving data mining. Advances in Database Systems, vol. 34, pp. 11\u201352. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5_2"},{"key":"20_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14142-8","volume-title":"Data Mining","author":"Charu C Aggarwal","year":"2015","unstructured":"Aggarwal, Charu C.: Data Mining. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-14142-8"},{"issue":"1","key":"20_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random projection based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. 18(1), 92\u2013106 (2006)","journal-title":"IEEE Trans. Knowl."},{"key":"20_CR9","unstructured":"Oliveria, S.R.M., Zaiane, O.R.: Data Perturbation by rotation for privacy preserving Clustering. Technical Report TR 04-17, August 2004"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Agarwal, C.C.: On randomization, public information and the curse of dimensionality. In: IEEE 23rd International conference on Data engineering, pp. 136\u2013145, April 2007","DOI":"10.1109\/ICDE.2007.367859"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 indentities in microdata release. IEEE Trans. Knowl. Data Eng. 13, 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"05","key":"20_CR12","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 571\u2013588 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"20_CR13","unstructured":"Kohavi, R., Becker, B.: UCI Machine Learning Repository ( http:\/\/archive.ics.uci.edu\/ml ). Adult, CA: University of California, School of Information and Computer Science"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1810-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T21:28:43Z","timestamp":1572384523000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1810-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811318092","9789811318108"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1810-8_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dehradun","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 April 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 April 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icacds.com","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}