{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:12:37Z","timestamp":1694635957315},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1007\/s10462-009-9106-9","type":"journal-article","created":{"date-parts":[[2009,7,4]],"date-time":"2009-07-04T11:11:18Z","timestamp":1246705878000},"page":"343-362","source":"Crossref","is-referenced-by-count":3,"title":["Providing predictions on distributed HMMs with privacy"],"prefix":"10.1007","volume":"28","author":[{"given":"Sahin","family":"Renckes","sequence":"first","affiliation":[]},{"given":"Huseyin","family":"Polat","sequence":"additional","affiliation":[]},{"given":"Yusuf","family":"Oysal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,5]]},"reference":[{"key":"9106_CR1","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1613\/jair.1491","volume":"22","author":"R Begletier","year":"2004","unstructured":"Begletier R, El-Yaniv R, Yona G (2004) On prediction using variable order Markov models. JAIR 22: 385\u2013421","journal-title":"JAIR"},{"key":"9106_CR2","unstructured":"Benaloh J (1994) Dense probabilistic encryption. In: Proceedings of the workshop on selected areas of cryptography, pp 120\u2013128"},{"key":"9106_CR3","doi-asserted-by":"crossref","unstructured":"Canny J (2002) Collaborative filtering with privacy. In: Proceedings of the IEEE symposium on security and privacy, pp 45\u201357","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"9106_CR4","doi-asserted-by":"crossref","unstructured":"Clifton C, Kantarcioglu M, Doan A, Schadow G, Vaidya J, Elmagarmid A, Suciu D (2004) Privacy-preserving data integration and sharing. In: Proceedings of the 9th ACM SIGMOD workshop on research issues in data mining and knowledge discovery, pp 19\u201326","DOI":"10.1145\/1008694.1008698"},{"issue":"2","key":"9106_CR5","first-page":"1","volume":"4","author":"C Clifton","year":"2003","unstructured":"Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu M (2003) Tools for privacy-preserving distributed data mining. ACM SIGKDD Explor 4(2): 1\u20137","journal-title":"ACM SIGKDD Explor"},{"key":"9106_CR6","unstructured":"Cranor LF, Reagle J, Ackerman MS (1999) Beyond concern: understanding net users\u2019 attitudes about online privacy. Available from http:\/\/www.research.att.com\/resources\/trs\/TRs\/99\/99.4\/99.4.3\/report.htm"},{"key":"9106_CR7","doi-asserted-by":"crossref","unstructured":"Cranor LF (2003) \u2018I didn\u2019t buy it for myself\u2019 privacy and e-commerce personalization. In: Proceedings of the 2003 ACM workshop on privacy in the electronic society, pp 111\u2013117","DOI":"10.1145\/1005140.1005158"},{"issue":"1","key":"9106_CR8","doi-asserted-by":"crossref","first-page":"49","DOI":"10.2174\/157489307779314348","volume":"2","author":"V De Fonzo","year":"2007","unstructured":"De Fonzo V, Aluffi-Pentini F, Parisi V (2007) Hidden Markov models in bioinformatics. Curr Bioinform 2(1): 49\u201361","journal-title":"Curr Bioinform"},{"key":"9106_CR9","unstructured":"Dugad R, Desai UB (1996) A tutorial on hidden Markov models. Technical Report SPANN-96.1, Indian Institute of Technology"},{"issue":"1","key":"9106_CR10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/TPWRS.2004.831265","volume":"20","author":"AM Gonz\u00e1lez","year":"2005","unstructured":"Gonz\u00e1lez AM, Roque AMS, Garc\u00eda-Gonz\u00e1lez J (2005) Modeling and forecasting electricity prices with input\/output hidden Markov models. IEEE Trans Power Syst 20(1): 13\u201324","journal-title":"IEEE Trans Power Syst"},{"key":"9106_CR11","doi-asserted-by":"crossref","unstructured":"Hassan R, Nath B (2005) Stock market forecasting using hidden Markov model: a new approach. In: Proceedings of the 2005 5th international conference on intelligent systems design and applications, pp 192\u2013196","DOI":"10.1109\/ISDA.2005.85"},{"key":"9106_CR12","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1089\/cmb.1997.4.127","volume":"4","author":"J Henderson","year":"1996","unstructured":"Henderson J, Salzberg S, Fasman K (1996) Finding genes in human DNA with a hidden Markov model. J Comput Biol 4: 127\u2013141","journal-title":"J Comput Biol"},{"key":"9106_CR13","first-page":"515","volume":"4702","author":"C Kaleli","year":"2007","unstructured":"Kaleli C, Polat H (2007) Providing na\u00efve Bayesian classifier-based private recommendations on partitioned data. LNAI 4702: 515\u2013522","journal-title":"LNAI"},{"key":"9106_CR14","unstructured":"Kantarcioglu M, Vaidya JS (2003) Privacy-preserving na\u00efve Bayes classifier for horizontally partitioned data. In: Proceedings of the 3rd IEEE international conference on data mining, workshop on privacy-preserving data mining, pp 3\u20139"},{"issue":"9","key":"9106_CR15","first-page":"1026","volume":"16","author":"M Kantarcioglu","year":"2004","unstructured":"Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE TKDE 16(9): 1026\u20131037","journal-title":"IEEE TKDE"},{"key":"9106_CR16","doi-asserted-by":"crossref","unstructured":"Merugu S, Ghosh J (2003) Privacy-preserving distributed clustering using generative models. In: Proceedings of the 3rd IEEE international conference on data mining, pp 211\u2013218","DOI":"10.1109\/ICDM.2003.1250922"},{"key":"9106_CR17","doi-asserted-by":"crossref","unstructured":"Naccache D, Stern J (1998) A new public key cryptosystem based on higher residues. In: Proceedings of the 5th ACM conference on computer and communication security, pp 59\u201366","DOI":"10.1145\/288090.288106"},{"key":"9106_CR18","first-page":"223","volume":"1592","author":"P Paillier","year":"1999","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residue classes. LNCS 1592: 223\u2013238","journal-title":"LNCS"},{"key":"9106_CR19","first-page":"651","volume":"3721","author":"H Polat","year":"2005","unstructured":"Polat H, Du W (2005a) Privacy-preserving collaborative filtering on vertically partitioned data. LNCS 3721: 651\u2013658","journal-title":"LNCS"},{"key":"9106_CR20","doi-asserted-by":"crossref","unstructured":"Polat H, Du W (2005b) Privacy-preserving top-N recommendation on horizontally partitioned data. In: Proceedings of the 2005 IEEE\/WIC\/ACM international conference on web intelligence, pp 725\u2013731","DOI":"10.1109\/WI.2005.117"},{"issue":"2","key":"9106_CR21","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner LR (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77(2): 257\u2013286","journal-title":"Proc IEEE"},{"key":"9106_CR22","doi-asserted-by":"crossref","unstructured":"Vaidya JS, Clifton C (2004) Privacy-preserving na\u00efve Bayes classifier for vertically partitioned data. In: Proceedings of the 2004 SIAM conference on data mining, pp 522\u2013526","DOI":"10.1137\/1.9781611972740.59"},{"issue":"1","key":"9106_CR23","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/974121.974131","volume":"3","author":"VS Verykios","year":"2004","unstructured":"Verykios VS, Bertino E, Fovino IN, Provenza LP, Saygin Y, Theodoridis Y (2004) State-of-the-art in privacy-preserving data mining. ACM SIGMOD Rec 3(1): 50\u201357","journal-title":"ACM SIGMOD Rec"},{"key":"9106_CR24","unstructured":"Zhang Y (2004) Prediction of financial time series with hidden Markov models. Master Thesis, Simon Fraser University"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-009-9106-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-009-9106-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-009-9106-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T04:22:55Z","timestamp":1633666975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-009-9106-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["9106"],"URL":"https:\/\/doi.org\/10.1007\/s10462-009-9106-9","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,12]]}}}