{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:43:10Z","timestamp":1773740590024,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T00:00:00Z","timestamp":1265932800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1007\/s00521-010-0346-z","type":"journal-article","created":{"date-parts":[[2010,2,11]],"date-time":"2010-02-11T10:09:16Z","timestamp":1265882956000},"page":"143-150","source":"Crossref","is-referenced-by-count":70,"title":["Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data"],"prefix":"10.1007","volume":"20","author":[{"given":"Ankur","family":"Bansal","sequence":"first","affiliation":[]},{"given":"Tingting","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,12]]},"reference":[{"key":"346_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal D, Srikant R (2000) Privacy preserving data mining. In Proceedings of the ACM SIGMOD, pp 439\u2013450","DOI":"10.1145\/335191.335438"},{"key":"346_CR2","unstructured":"Blake CL, Merz CJ (1998) UCI repository of machine learning databases, Department of Information and Computer Science, University of California, Irvine, CA. http:\/\/www.ics.uci.edu\/mlearn\/MLRepository.html"},{"key":"346_CR3","doi-asserted-by":"crossref","unstructured":"Barni M, Orlandi C, Piva A (2006) A privacy-preserving protocol for neural-network-based computation. In: Proceeding of the 8th workshop on multimedia and security, pp 146\u2013151","DOI":"10.1145\/1161366.1161393"},{"key":"346_CR4","unstructured":"Cranor LF, Reagle J, Ackerman MS (1999) Beyond concern: understanding net users attitudes about online privacy. Technical report TR 99.4.3, AT&T Labs-Research. Available from http:\/\/www.research.att.com\/library\/trs\/TRs\/99\/99.4\/99.4.3\/report.htm"},{"issue":"10","key":"346_CR5","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1109\/TNN.2009.2026902","volume":"20","author":"T Chen","year":"2009","unstructured":"Chen T, Zhong S (2009) Privacy preserving back-propagation neural network learning. IEEE Trans Neural Netw 20(10):1554\u20131564","journal-title":"IEEE Trans Neural Netw"},{"issue":"4","key":"346_CR6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"346_CR7","doi-asserted-by":"crossref","unstructured":"Cranor LF (ed) (1999) Special issue. Internet Priv Commun ACM 42(2)","DOI":"10.1145\/293411.293440"},{"key":"346_CR8","unstructured":"(2001) Standard for privacy of individually identifiable health information. Fed Regist 66(40). http:\/\/www.hhs.gov\/ocr\/hipaa\/finalmaster.html."},{"key":"346_CR9","doi-asserted-by":"crossref","unstructured":"Goldreich O, Micali S, Wigderson A (1987) How to play ANY mental game. In: Proceedings of annual ACM conference on theory of computing, pp 218\u2013229","DOI":"10.1145\/28395.28420"},{"key":"346_CR10","unstructured":"HIPPA, National Standards to Protect the Privacy of Personal Health Information. http:\/\/www.hhs.gov\/ocr\/hipaa\/finalreg.html"},{"key":"346_CR11","doi-asserted-by":"crossref","unstructured":"Jagannathan G, Wright RN (2005) Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the ACM SIGKDD, pp 593\u2013599","DOI":"10.1145\/1081870.1081942"},{"key":"346_CR12","doi-asserted-by":"crossref","unstructured":"Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng 16(9):1026\u20131037","DOI":"10.1109\/TKDE.2004.45"},{"key":"346_CR13","doi-asserted-by":"crossref","unstructured":"Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Proceedings of the 20th annual international cryptology conference on advances in cryptology, pp 36\u201354","DOI":"10.1007\/3-540-44598-6_3"},{"key":"346_CR14","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: The eighth ACM SIGKDD international conference on knowledge discovery and data mining, pp 639\u2013644","DOI":"10.1145\/775047.775142"},{"key":"346_CR15","doi-asserted-by":"crossref","unstructured":"Wan L, Ng WK, Han S, Lee VCS (2007) Privacy-preservation for gradient descent methods. In: Proceedings of ACM SIGKDD, pp 775\u2013783","DOI":"10.1145\/1281192.1281275"},{"key":"346_CR16","doi-asserted-by":"crossref","unstructured":"Wright R, Yang Z (2004) Privacy preserving Bayesian network structure computation on distributed heterogeneous data. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, pp 713\u2013718","DOI":"10.1145\/1014052.1014145"},{"key":"346_CR17","doi-asserted-by":"crossref","unstructured":"Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, pp 160\u2013164","DOI":"10.1109\/SFCS.1982.38"},{"key":"346_CR18","doi-asserted-by":"crossref","unstructured":"Yang Z, Zhong S, Wright R (2005) Privacy-preserving classification of customer data without loss of accuracy. In: Proceedings of the 5th SIAM international conference on data mining (SDM)","DOI":"10.1137\/1.9781611972757.9"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-010-0346-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-010-0346-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-010-0346-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T02:07:00Z","timestamp":1559095620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-010-0346-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,12]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["346"],"URL":"https:\/\/doi.org\/10.1007\/s00521-010-0346-z","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,12]]}}}