{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:35:54Z","timestamp":1729611354917,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6824984","type":"proceedings-article","created":{"date-parts":[[2014,6,16]],"date-time":"2014-06-16T21:53:24Z","timestamp":1402955604000},"page":"188-193","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preserving distributed structure learning of probabilistic graphical models"],"prefix":"10.1109","author":[{"family":"Husheng Li","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2005.49"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"journal-title":"Causality Models Reasoning and Inference","year":"2000","author":"pearl","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390265"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213876"},{"journal-title":"Learning Bayesian Networks","year":"2004","author":"neapolitan","key":"12"},{"key":"3","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/978-3-642-03549-4_8","article-title":"Privacy-preserving classifier learning financial cryptography and data security","volume":"5628","author":"brickell","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Scaling Up Machine Learning","year":"2012","author":"bekkerman","key":"2"},{"journal-title":"The National Longitudinal Study of Adolescent Health Research Design","year":"2011","author":"bearman","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"journal-title":"Probabilistic Graphical Models Principles and Techniques","year":"2009","author":"koller","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454152"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"4","article-title":"Differential privacy, in the 40th international colloquium on automata","author":"dwork","year":"2006","journal-title":"J Programming Languages"},{"key":"9","article-title":"A revolution that will transform how we live","author":"mayer-schonoberger","year":"2013","journal-title":"Work and Think Eamon Dolan\/"},{"key":"8","article-title":"Privacy preserving data mining","author":"lindell","year":"2000","journal-title":"Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06824984.pdf?arnumber=6824984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:59:19Z","timestamp":1498129159000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6824984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6824984","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}