{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:44:39Z","timestamp":1705949079172},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,8,26]],"date-time":"2008-08-26T00:00:00Z","timestamp":1219708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1007\/s10115-008-0158-y","type":"journal-article","created":{"date-parts":[[2008,8,25]],"date-time":"2008-08-25T15:53:53Z","timestamp":1219679633000},"page":"133-157","source":"Crossref","is-referenced-by-count":15,"title":["A hybrid multi-group approach for privacy-preserving data mining"],"prefix":"10.1007","volume":"19","author":[{"given":"Zhouxuan","family":"Teng","sequence":"first","affiliation":[]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,8,26]]},"reference":[{"key":"158_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal D, Aggarwal C (2001) On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems","DOI":"10.1145\/375551.375602"},{"key":"158_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD on management of data, Dallas, TX, USA, May 15\u201318, 2000","DOI":"10.1145\/342009.335438"},{"key":"158_CR3","doi-asserted-by":"crossref","unstructured":"Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu M (2002) Tools for privacy preserving data mining. SIGKDD Explorations, December 2002","DOI":"10.1145\/772862.772867"},{"key":"158_CR4","unstructured":"Du W, Zhan Z (2002) Building decision tree classifier on private data. Workshop on privacy, security, and data mining at the 2002 IEEE International Conference on Data Mining (ICDM\u201902), Maebashi City, Japan, December 9"},{"key":"158_CR5","doi-asserted-by":"crossref","unstructured":"Du W, Zhan Z (2003) Using randomized response techniques for privacy-preserving data mining. In: Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining, Washington, DC, USA","DOI":"10.1145\/956750.956810"},{"key":"158_CR6","doi-asserted-by":"crossref","unstructured":"Evfimievski A, Srikant R, Agrawal R, and Gehrke J (2002) Privacy preserving mining of association rules. In: Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining, Edmonton, Alberta, Canada","DOI":"10.1145\/775047.775080"},{"key":"158_CR7","doi-asserted-by":"crossref","unstructured":"Goldwasser S (1997) Multi-party computations: past and present. In: Proceedings of the 16th annual ACM symposium on principles of distributed computing, Santa Barbara, CA, USA, August 21\u201324, 1997","DOI":"10.1145\/259380.259405"},{"key":"158_CR8","unstructured":"Han J, Kamber M (2001) Data mining concepts and techniques. Morgan Kaufmann Publishers, San Francisco"},{"key":"158_CR9","doi-asserted-by":"crossref","unstructured":"Kantarcioglu M, Jin J, and Clifton C (2004) When do data mining results violate privacy? In: Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2004), Seattle, WA, USA","DOI":"10.1145\/1014052.1014126"},{"key":"158_CR10","doi-asserted-by":"crossref","unstructured":"Kargupta H, Datta S, Wang Q, Sivakumar K (2003) On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the 3rd IEEE international conference on data mining (ICDM), Melbourne, Florida, USA, November 19\u201322, 2003","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"158_CR11","doi-asserted-by":"crossref","unstructured":"Lindell Y, Pinkas B (2000) Privacy preserving data mining. Advances in Cryptology\u2014Crypto2000. Lecture Notes in Computer Science, vol 1880","DOI":"10.1007\/3-540-44598-6_3"},{"key":"158_CR12","doi-asserted-by":"crossref","unstructured":"Meng D, Sivakumar K, and Kargupta H (2004) Privacy sensitive bayesian network parameter learning. In: Proceedings of the fourth IEEE International conference on data mining (ICDM), Brighton, UK","DOI":"10.1109\/ICDM.2004.10076"},{"issue":"2","key":"158_CR13","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/772862.772865","volume":"4","author":"B Pinkas","year":"2002","unstructured":"Pinkas B (2002) Cryptographic techniques for privacy-preserving data mining. SIGKDD Explor 4(2): 12\u201319","journal-title":"SIGKDD Explor"},{"key":"158_CR14","doi-asserted-by":"crossref","unstructured":"Rizvi S, Haritsa J (2002) Maintaining data privacy in association rule mining. In: Proceedings of the 28th VLDB conference, Hong Kong, China","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"158_CR15","doi-asserted-by":"crossref","unstructured":"Sanil A, Karr A, Lin X, Reiter J (2004) Privacy preserving regression modelling via distributed computation. In: Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining (KDD), Seattle, WA, USA","DOI":"10.1145\/1014052.1014139"},{"key":"158_CR16","doi-asserted-by":"crossref","unstructured":"Subramaniam H, Wright R, Yang Z (2004) Experimental analysis of privacy-preserving statistics computation. In: Proceedings of the workshop on secure data management (held in conjunction with VLDB\u201904). LNCS, vol 3178. Springer, Heidelberg","DOI":"10.1007\/978-3-540-30073-1_5"},{"key":"158_CR17","unstructured":"Teng Z, Du W (2007) A hybrid multi-group approach for privacy preserving decision tree building. In: Proceedings of the 11th Pacific-Asia conference on knowledge discovery and data mining (PAKDD 2007)"},{"key":"158_CR18","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining, July 23\u201326","DOI":"10.1145\/775047.775142"},{"key":"158_CR19","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton C (2003) Privacy-preserving K-means clustering over vertically partitioned data. In: Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining August 24\u201327","DOI":"10.1145\/956750.956776"},{"issue":"2","key":"158_CR20","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10115-007-0073-7","volume":"14","author":"J Vaidya","year":"2007","unstructured":"Vaidya J, Yu H, Jiang X (2007) Privacy-preserving svm classification. J Knowl Inf Syst 14(2): 161\u2013178","journal-title":"J Knowl Inf Syst"},{"issue":"3","key":"158_CR21","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s10115-006-0035-5","volume":"11","author":"K Wang","year":"2007","unstructured":"Wang K, Fung B, Yu P (2007) Handicapping Attacker\u2019s confidence: an alternative to k-anonymization. J Knowl Inf Syst 11(3): 345\u2013368","journal-title":"J Knowl Inf Syst"},{"key":"158_CR22","doi-asserted-by":"crossref","unstructured":"Wang K, Yu P, Chakraborty S (2004) Bottom-up generalization: a data mining solution to privacy protection. In: Proceedings of the fourth IEEE international conference on data mining (ICDM), Brighton, UK","DOI":"10.1109\/ICDM.2004.10110"},{"issue":"309","key":"158_CR23","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"S Warner","year":"1965","unstructured":"Warner S (1965) Randomized response: a survey technique for eliminating evasive answer bias. J Am Stat Assoc 60(309): 63\u201369","journal-title":"J Am Stat Assoc"},{"key":"158_CR24","doi-asserted-by":"crossref","unstructured":"Wright R, Yang Z (2004) Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In: Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining (KDD), Seattle, WA, USA","DOI":"10.1145\/1014052.1014145"},{"issue":"3","key":"158_CR25","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s10115-006-0001-2","volume":"10","author":"S Xu","year":"2006","unstructured":"Xu S, Zhang J, Han D, Wang J (2006) Singular value decomposition based data distortion strategy for privacy protection. J Knowl Inf Syst 10(3): 383\u2013397","journal-title":"J Knowl Inf Syst"},{"key":"158_CR26","doi-asserted-by":"crossref","unstructured":"Zhu Y, Liu L (2004) Optimal randomization for privacy preserving data mining. In: Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/1014052.1014153"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-008-0158-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-008-0158-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-008-0158-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T10:10:18Z","timestamp":1559124618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-008-0158-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8,26]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,5]]}},"alternative-id":["158"],"URL":"https:\/\/doi.org\/10.1007\/s10115-008-0158-y","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,8,26]]}}}