{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T02:22:11Z","timestamp":1776133331461,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811556784","type":"print"},{"value":"9789811556791","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5679-1_49","type":"book-chapter","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:05:18Z","timestamp":1598688318000},"page":"507-514","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Ensuring Data Privacy Using Machine Learning for Responsible Data Science"],"prefix":"10.1007","author":[{"given":"Millena Debaprada","family":"Jena","sequence":"first","affiliation":[]},{"given":"Sunil Samanta","family":"Singhar","sequence":"additional","affiliation":[]},{"given":"Bhabendu Kumar","family":"Mohanta","sequence":"additional","affiliation":[]},{"given":"Somula","family":"Ramasubbareddy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,30]]},"reference":[{"issue":"1","key":"49_CR1","first-page":"1","volume":"11","author":"Divesh Srivastava","year":"2019","unstructured":"Srivastava, Divesh, Scannapieco, Monica, Redman, Thomas C.: Ensuring high-quality private data for responsible data science: vision and challenges. J. Data. Info. Q. (JDIQ) 11(1), 1 (2019)","journal-title":"J. Data. Info. Q. (JDIQ)"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Singh, S., Prabhakar, S.: Ensuring correctness over untrusted private database. In: Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology, pp. 476\u2013486. ACM (March 2008)","DOI":"10.1145\/1353343.1353402"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Woodall, P.M.: The data repurposing challenge: new pressures from data analytics. (2017)","DOI":"10.1145\/3022698"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Chen, D.L., Jess, E.: Can machine learning help predict the outcome of asylum adjudications?. In: Proceedings of the 16th Edition of the International Conference on Articial Intelligence and Law. ACM (2017)","DOI":"10.1145\/3086512.3086538"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Andrews, V.: Analyzing awareness on data privacy. In: Proceedings of the 2019 ACM Southeast Conference. ACM, (2019)","DOI":"10.1145\/3299815.3314458"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Liu, X., et al.: \u201cPreserving patient privacy when sharing same-disease data. J. Data Info. Q. (JDIQ) 7(4), 17 (2016)","DOI":"10.1145\/2956554"},{"key":"49_CR7","unstructured":"Bishop, C.M.: Pattern recognition and machine learning. In: Springer Science\u2009\u2009Business Media, (2006)"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Smith, M., et al.: Big data privacy issues in public social media. In: 2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST). IEEE, (2012)","DOI":"10.1109\/DEST.2012.6227909"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Chen, D., Hong, Z.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 1. IEEE, (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"issue":"2","key":"49_CR10","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"Anna L Buczak","year":"2015","unstructured":"Buczak, Anna L., Guven, Erhan: A survey of data mining and machine learn-ing methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"49_CR11","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"Kun Liu","year":"2005","unstructured":"Liu, Kun, Kargupta, Hillol, Ryan, Jessica: Random projection-based multi-plicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1), 92\u2013106 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"49_CR12","doi-asserted-by":"publisher","unstructured":"Mohanta, B.K., Panda, S.S., Jena, D.: An overview of smart contract and use cases in blockchain tech-nology. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICC-CNT), (July 2018). \nhttps:\/\/doi.org\/10.1109\/icccnt.2018.8494045","DOI":"10.1109\/icccnt.2018.8494045"},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Cyphers, B., Veeramachaneni, K.: AnonML: locally private machine learning over a network of peers\u2019 (2017)","DOI":"10.1109\/DSAA.2017.80"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: \u2018Robust de-anonymization of large sparse datasets. In: Proceedings\u2014IEEE Symposium on Security and Privacy, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5679-1_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:14:32Z","timestamp":1598688872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5679-1_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,30]]},"ISBN":["9789811556784","9789811556791"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5679-1_49","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,30]]},"assertion":[{"value":"30 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}