{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:50:14Z","timestamp":1730224214582,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/glocom.2017.8253990","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:50:54Z","timestamp":1516038654000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Preserving Distributed Classification: A Satisfaction Equilibrium Approach"],"prefix":"10.1109","author":[{"given":"Lei","family":"Xu","sequence":"first","affiliation":[]},{"given":"Chunxiao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Youjian","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249454"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11766247_6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2011.2180507"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2014.7032119"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.1403008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990359"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2014.7032119"},{"journal-title":"UCI Machine Learning Repository","year":"2013","author":"lichman","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.43"},{"key":"ref6","first-page":"123","article-title":"Vickrey-Clarke-Groves for privacy-preserving collaborative classification","author":"panoui","year":"2013","journal-title":"2013 Federated Conference on Computer Science and Information Systems FedCSIS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.52"},{"key":"ref8","first-page":"345","article-title":"Privacy-preserving distributed association rule mining based on the secret sharing technique","author":"ge","year":"2010","journal-title":"Software Engineering and Data Mining (SEDM) 2010 2nd International Conference on"},{"key":"ref7","first-page":"523","author":"kargupta","year":"2007","journal-title":"Multi-party Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2362522"},{"key":"ref1","first-page":"341","author":"park","year":"2002","journal-title":"Distributed Data Mining Algorithms Systems and Applications"},{"key":"ref9","first-page":"9426611777","article-title":"A novel privacy preserving game theoretic repeated rational secret sharing scheme for distributed data mining","volume":"91","author":"nanavati","year":"2013","journal-title":"dcj"}],"event":{"name":"2017 IEEE Global Communications Conference (GLOBECOM 2017)","start":{"date-parts":[[2017,12,4]]},"location":"Singapore","end":{"date-parts":[[2017,12,8]]}},"container-title":["GLOBECOM 2017 - 2017 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253768\/8253909\/08253990.pdf?arnumber=8253990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T19:14:17Z","timestamp":1519067657000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8253990\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/glocom.2017.8253990","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}