{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:25:39Z","timestamp":1740176739745,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T00:00:00Z","timestamp":1522713600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000893","name":"Simons Foundation","doi-asserted-by":"publisher","award":["512620"],"award-info":[{"award-number":["512620"]}],"id":[{"id":"10.13039\/100000893","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s41060-018-0117-y","type":"journal-article","created":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T05:22:15Z","timestamp":1522732935000},"page":"103-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Elliptical modeling and pattern analysis for perturbation models and classification"],"prefix":"10.1007","volume":"7","author":[{"given":"Shan","family":"Suthaharan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3137-1085","authenticated-orcid":false,"given":"Weining","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,3]]},"reference":[{"issue":"2","key":"117_CR1","first-page":"701","volume":"120","author":"P Aghion","year":"2005","unstructured":"Aghion, P., Bloom, N., Blundell, R., Griffith, R., Howitt, P.: Competition and innovation: an inverted-u relationship. Q. J. Econ. 120(2), 701\u2013728 (2005)","journal-title":"Q. J. Econ."},{"issue":"1","key":"117_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TNN.2003.820667","volume":"15","author":"R Boscolo","year":"2004","unstructured":"Boscolo, R., Pan, H., Roychowdhury, V.P.: Independent component analysis based on nonparametric density estimation. IEEE Trans. Neural Netw. 15(1), 55\u201365 (2004)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"2","key":"117_CR3","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123\u2013140 (1996)","journal-title":"Mach. Learn."},{"issue":"1","key":"117_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"117_CR5","volume-title":"Practical Statistics for Data Scientists: 50 Essential Concepts","author":"P Bruce","year":"2017","unstructured":"Bruce, P., Bruce, A.: Practical Statistics for Data Scientists: 50 Essential Concepts. O\u2019Reilly Media, Inc., Sebastopol (2017)"},{"key":"117_CR6","unstructured":"Caiafa, C.F., Proto, A.N.: A non-gaussianity measure for blind source separation. In: Proceedings of SPARS05 (2005)"},{"key":"117_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.compag.2016.03.026","volume":"124","author":"A Chaudhary","year":"2016","unstructured":"Chaudhary, A., Kolhe, S., Kamal, R.: A hybrid ensemble for classification in multiclass datasets: an application to oilseed disease dataset. Comput. Electron. Agric. 124, 65\u201372 (2016)","journal-title":"Comput. Electron. Agric."},{"issue":"Mar","key":"117_CR8","first-page":"1069","volume":"12","author":"K Chaudhuri","year":"2011","unstructured":"Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. J. Mach. Learn. Res. 12(Mar), 1069\u20131109 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"117_CR9","doi-asserted-by":"crossref","unstructured":"Du, K.L., Swamy, M.: Principal component analysis. In: Neural Networks and Statistical Learning, pp. 355\u2013405. Springer, London (2014)","DOI":"10.1007\/978-1-4471-5571-3_12"},{"key":"117_CR10","doi-asserted-by":"publisher","first-page":"1348","DOI":"10.1198\/016214501753382273","volume":"96","author":"J Fan","year":"2001","unstructured":"Fan, J., Li, R.: Variable selection via nonconcave penalized likelihood and its oracle properties. J. Am. Stat. Assoc. 96, 1348\u20131360 (2001)","journal-title":"J. Am. Stat. Assoc."},{"issue":"4","key":"117_CR11","first-page":"485","volume":"14","author":"SE Fienberg","year":"1998","unstructured":"Fienberg, S.E., Steele, R.J.: Disclosure limitation using perturbation and related methods for categorical data. J. Off. Stat. 14(4), 485\u2013502 (1998)","journal-title":"J. Off. Stat."},{"issue":"2","key":"117_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/1083784.1083789","volume":"34","author":"MM Gaber","year":"2005","unstructured":"Gaber, M.M., Zaslavsky, A., Krishnaswamy, S.: Mining data streams: a review. SIGMOD Rec. 34(2), 18\u201326 (2005). \n                    https:\/\/doi.org\/10.1145\/1083784.1083789","journal-title":"SIGMOD Rec."},{"key":"117_CR13","unstructured":"Geiger, B.C.: Information loss in deterministic systems. Ph. D. Thesis, Graz University of Technology, Graz, Austria (2014)"},{"key":"117_CR14","unstructured":"Hung, C.C., Liu, H.C., Lin, C.C., Lee, B.O.: Development and validation of the simulation-based learning evaluation scale. Nurse Educ. Today 40, 72\u201377 (2016)"},{"key":"117_CR15","doi-asserted-by":"crossref","unstructured":"Jeyakumar, V., Li, G., Suthaharan, S.: Support vector machine classifiers with uncertain knowledge sets via robust optimization. Optimization 63(7), 1099\u20131116 (2014)","DOI":"10.1080\/02331934.2012.703667"},{"key":"117_CR16","doi-asserted-by":"crossref","unstructured":"Jin, S., Yeung, D.S., Wang, X.: Network intrusion detection in covariance feature space. Pattern Recogn. 40(8), 2185\u20132197 (2007","DOI":"10.1016\/j.patcog.2006.12.010"},{"issue":"2065","key":"117_CR17","doi-asserted-by":"publisher","first-page":"20150202","DOI":"10.1098\/rsta.2015.0202","volume":"374","author":"IT Jolliffe","year":"2016","unstructured":"Jolliffe, I.T., Cadima, J.: Principal component analysis: a review and recent developments. Philos. Trans. R. Soc. A 374(2065), 20150202 (2016)","journal-title":"Philos. Trans. R. Soc. A"},{"issue":"S2","key":"117_CR18","doi-asserted-by":"publisher","first-page":"P188","DOI":"10.1186\/1471-2202-8-S2-P188","volume":"8","author":"DG Jones","year":"2007","unstructured":"Jones, D.G., Beston, B.R., Murphy, K.M.: Novel application of principal component analysis to understanding visual cortical development. BMC Neurosci. 8(S2), P188 (2007)","journal-title":"BMC Neurosci."},{"issue":"3","key":"117_CR19","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1109\/TKDE.2009.88","volume":"22","author":"TA Lasko","year":"2010","unstructured":"Lasko, T.A., Vinterbo, S.A.: Spectral anonymization of data. IEEE Trans. Knowl. Data Eng. 22(3), 437\u2013446 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"117_CR20","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.neuroimage.2016.06.041","volume":"142","author":"S Lee","year":"2016","unstructured":"Lee, S., Habeck, C., Razlighi, Q., Salthouse, T., Stern, Y.: Selective association between cortical thickness and reference abilities in normal aging. NeuroImage 142, 293\u2013300 (2016)","journal-title":"NeuroImage"},{"key":"117_CR21","unstructured":"Lichman, M.: UCI machine learning repository (2013). \n                    http:\/\/archive.ics.uci.edu\/ml\n                    \n                  . Accessed 1 Nov 2017"},{"issue":"2","key":"117_CR22","first-page":"407","volume":"9","author":"RJ Little","year":"1993","unstructured":"Little, R.J.: Statistical analysis of masked data. J. Off. Stat. 9(2), 407\u2013426 (1993)","journal-title":"J. Off. Stat."},{"key":"117_CR23","doi-asserted-by":"crossref","unstructured":"Liu, K., Giannella, C., Kargupta, H.: A survey of attack techniques on privacy-preserving data perturbation methods. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining, pp. 359\u2013381. Springer, US (2008)","DOI":"10.1007\/978-0-387-70992-5_15"},{"issue":"4","key":"117_CR24","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1023\/A:1025610705286","volume":"13","author":"K Muralidhar","year":"2003","unstructured":"Muralidhar, K., Sarathy, R.: A theoretical basis for perturbation methods. Stat. Comput. 13(4), 329\u2013335 (2003)","journal-title":"Stat. Comput."},{"issue":"4","key":"117_CR25","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1023\/A:1009744630224","volume":"2","author":"SK Murthy","year":"1998","unstructured":"Murthy, S.K.: Automatic construction of decision trees from data: a multi-disciplinary survey. Data Min. Knowl. Discov. 2(4), 345\u2013389 (1998)","journal-title":"Data Min. Knowl. Discov."},{"key":"117_CR26","doi-asserted-by":"crossref","unstructured":"Oliveira, S.R., Za\u00efane, O.R.: Achieving privacy preservation when sharing data for clustering. In: Jonker, W., Petkovi\u0107, M. (eds.) Workshop on Secure Data Management, pp. 67\u201382. Springer, Berlin Heidelberg (2004)","DOI":"10.1007\/978-3-540-30073-1_6"},{"issue":"3","key":"117_CR27","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1287\/mnsc.2014.2026","volume":"61","author":"Y Qian","year":"2015","unstructured":"Qian, Y., Xie, H.: Drive more effective data-based innovations: enhancing the utility of secure databases. Manag. Sci. 61(3), 520\u2013541 (2015)","journal-title":"Manag. Sci."},{"key":"117_CR28","doi-asserted-by":"crossref","unstructured":"Rubens, N., Elahi, M., Sugiyama, M., Kaplan, D.: Recommender systems handbook. In: Ricci, F., Rokach, L., Shapira B. (eds.) Active Learning in Recommender Systems, pp. 809\u2013846. Springer, Boston (2016)","DOI":"10.1007\/978-1-4899-7637-6_24"},{"issue":"22","key":"117_CR29","doi-asserted-by":"publisher","first-page":"5507","DOI":"10.1109\/TSP.2013.2276416","volume":"61","author":"M S\u00f8rensen","year":"2013","unstructured":"S\u00f8rensen, M., De Lathauwer, L.: Blind signal separation via tensor decomposition with Vandermonde factor: canonical polyadic decomposition. IEEE Trans. Signal Process. 61(22), 5507\u20135519 (2013)","journal-title":"IEEE Trans. Signal Process."},{"key":"117_CR30","volume-title":"Machine Learning Models and Algorithms for Big Data Classification: Thinking with Examples for Effective Learning","author":"S Suthaharan","year":"2015","unstructured":"Suthaharan, S.: Machine Learning Models and Algorithms for Big Data Classification: Thinking with Examples for Effective Learning, vol. 36. Springer, New York (2015)"},{"key":"117_CR31","doi-asserted-by":"crossref","unstructured":"Suthaharan, S.: Support vector machine. In: Machine Learning Models and Algorithms for Big Data Classification, pp. 207\u2013235. Springer, US (2016)","DOI":"10.1007\/978-1-4899-7641-3_9"},{"key":"117_CR32","unstructured":"Suthaharan, S., Panchagnula, T.: Relevance feature selection with data cleaning for intrusion detection system. In: Southeastcon, 2012 Proceedings of IEEE, pp. 1\u20136. IEEE (2012)"},{"key":"117_CR33","volume-title":"Learning to Learn","author":"S Thrun","year":"2012","unstructured":"Thrun, S., Pratt, L.: Learning to Learn. Springer, New York (2012)"},{"issue":"4","key":"117_CR34","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/2627534.2627560","volume":"41","author":"J Whitworth","year":"2014","unstructured":"Whitworth, J., Suthaharan, S.: Security problems and challenges in a machine learning-based hybrid big data processing network systems. ACM SIGMETRICS Perform. Eval. Rev. 41(4), 82\u201385 (2014)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"117_CR35","doi-asserted-by":"crossref","unstructured":"Zarzoso, V., Nandi, A.: Blind source separation. In: Nandi, A. (ed.) Blind Estimation Using Higher-Order Statistics, pp. 167\u2013252. Springer, US (1999)","DOI":"10.1007\/978-1-4757-2985-6_4"},{"key":"117_CR36","unstructured":"Zumel, N., Mount, J., Porzak, J.: Practical data science with R, 1st edn. Manning, Shelter Island (2014)"}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-018-0117-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41060-018-0117-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-018-0117-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T13:23:26Z","timestamp":1556198606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41060-018-0117-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,3]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["117"],"URL":"https:\/\/doi.org\/10.1007\/s41060-018-0117-y","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"type":"print","value":"2364-415X"},{"type":"electronic","value":"2364-4168"}],"subject":[],"published":{"date-parts":[[2018,4,3]]},"assertion":[{"value":"25 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}