{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T19:13:05Z","timestamp":1648926785605},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,2,27]],"date-time":"2011-02-27T00:00:00Z","timestamp":1298764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1007\/s00521-011-0549-y","type":"journal-article","created":{"date-parts":[[2011,2,26]],"date-time":"2011-02-26T02:21:49Z","timestamp":1298686909000},"page":"1255-1262","source":"Crossref","is-referenced-by-count":1,"title":["Protecting data privacy in growing neural gas"],"prefix":"10.1007","volume":"21","author":[{"given":"Tingting","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ankur","family":"Bansal","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,27]]},"reference":[{"key":"549_CR1","first-page":"625","volume-title":"Advances in neural information processing systems 7","author":"B Fritzke","year":"1995","unstructured":"Fritzke B (1995) A growing neural gas network learns topologies. In: Tesauro G, Touretzky DS, Leen TK (eds) Advances in neural information processing systems 7. MIT Press, Cambridge, pp 625\u2013632"},{"key":"549_CR2","unstructured":"HIPAA, National Standards to Protect the Privacy of Personal Health Information. http:\/\/www.hhs.gov\/ocr\/hipaa\/finalreg.html"},{"key":"549_CR3","doi-asserted-by":"crossref","unstructured":"Han S, Ng W (2007) Privacy-preserving genetic algorithms for rule discovery. In: Proceedings of the international conference on data warehousing and knowledge discovery","DOI":"10.1007\/978-3-540-74553-2_38"},{"key":"549_CR4","doi-asserted-by":"crossref","unstructured":"Sakuma J, Kobayashi S (2007) A genetic algorithm for privacy-preserving combinatorial optimization. In: Proceedings of the conference on genetic and evolutionary computation","DOI":"10.1145\/1276958.1277214"},{"key":"549_CR5","first-page":"41","volume":"6239\/2011","author":"D Funke","year":"2011","unstructured":"Funke D, Kerschbaum F (2011) Privacy-preserving multiobjective evolutionary algorithms. Lect Notes Comput Sci 6239\/2011:41\u201350","journal-title":"Lect Notes Comput Sci"},{"key":"549_CR6","unstructured":"Chang YC, Lu CJ (2001) Oblivious polynomial evaluation and oblivious neural learning. In: Proceedings of Asiacrypt, pp 369\u2013384"},{"key":"549_CR7","doi-asserted-by":"crossref","unstructured":"Barni M, Orlandi C, Piva A (2006) A privacy-preserving protocol for neural network-based computation. In: Proceedings of the 8th workshop on multimedia and security. ACM Press, New York, pp 146\u2013151","DOI":"10.1145\/1161366.1161393"},{"key":"549_CR8","unstructured":"Chen T, Zhong S (2009) Privacy-preserving back-propagation neural network learning. IEEE Trans Neural Netw, accepted, to appear"},{"key":"549_CR9","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton C (2002) Privacy-preserving association rule mining in vertically partitioned data. In: Proceedings of SIGKDD02, pp 639\u2013644","DOI":"10.1145\/775047.775142"},{"key":"549_CR10","doi-asserted-by":"crossref","unstructured":"Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowledge Data Eng 16(4)","DOI":"10.1109\/TKDE.2004.45"},{"key":"549_CR11","doi-asserted-by":"crossref","unstructured":"Zhang N, Wang S, Zhao W (2005) A new scheme on privacy-preserving data classification. In: Proceedings of the ACM SIGKDD, pp 374\u2013383","DOI":"10.1145\/1081870.1081913"},{"key":"549_CR12","unstructured":"Jagannathan G, Wright RN (2005) Privacy-preserving distributed k-means. In: Proceedings of ACM SIGKDD, pp 593\u2013599"},{"key":"549_CR13","doi-asserted-by":"crossref","unstructured":"Agrawal D, Srikant R (2000) Privacy-preserving data mining, In Proceedings of ACM SIGMOD, pp 439\u2013450","DOI":"10.1145\/342009.335438"},{"key":"549_CR14","unstructured":"Chen Keke, Liu Ling (2005) Privacy-preserving data classification with rotation perturbation. In Proceeding of ICDM\u201905. IEEE Comput Soc, pp 589\u2013592"},{"key":"549_CR15","doi-asserted-by":"crossref","unstructured":"Lindell Y, Pinkas B (2000) Privacy-preserving data mining. In: Proceedings of the 20th annual international cryptology conference on advances in cryptology (CRYPTO\u201900), vol 1880 of lecture notes in computer science. Santa Barbara, Calif, pp 36\u201344","DOI":"10.1007\/3-540-44598-6_3"},{"key":"549_CR16","doi-asserted-by":"crossref","unstructured":"Laur S, Lipmaa H, Mielikaihen T (2006) Cryptographically private support vector machines. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining (SIGKDD 06). ACM Press, New York, pp 618\u2013624","DOI":"10.1145\/1150402.1150477"},{"key":"549_CR17","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton C (2004) Privacy-preserving naive Bayes classifier for vertically partitioned data. In: Proceedings of SIAM international conference on data mining","DOI":"10.1137\/1.9781611972740.59"},{"key":"549_CR18","doi-asserted-by":"crossref","unstructured":"Yang Z, Zhong S, Wright R (2005) Privacy-preserving classification of customer data without loss of accuracy. In: Proceedings of 5th SIAM international conference on data mining (SDM). SIAM","DOI":"10.1137\/1.9781611972757.9"},{"key":"549_CR19","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography, vol 1 and 2","author":"O Goldreich","year":"2001","unstructured":"Goldreich O (2001\u20132004) Foundations of cryptography, vol 1 and 2. Cambridge University Press, Cambridge"},{"key":"549_CR20","unstructured":"Yao A (1986) How to generate and exchange secrtes. In: Proceedings of the 27th IEEE symposium on foundations of computer science, pp 162\u2013167"},{"key":"549_CR21","unstructured":"Lindell Y, Pinkas B (2004) A proof of Yao\u2019s protocol for secure two-party computation electronic colloquium on computational complexity (ECCC)(063)"},{"key":"549_CR22","unstructured":"UCI dataset Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"549_CR23","unstructured":"Malkhi D, Nisan N, Pinkas B, Sella Y (2004) Fairplaya secure two-party computation system. In: Proceedings of the 13th conference on USENIX security symposium. San Diego, p 20"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-011-0549-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-011-0549-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-011-0549-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T21:36:59Z","timestamp":1560029819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-011-0549-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,27]]},"references-count":23,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["549"],"URL":"https:\/\/doi.org\/10.1007\/s00521-011-0549-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,27]]}}}