{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:38:15Z","timestamp":1725478695124},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/grc.2008.4664790","type":"proceedings-article","created":{"date-parts":[[2008,11,5]],"date-time":"2008-11-05T19:42:27Z","timestamp":1225914147000},"page":"86-92","source":"Crossref","is-referenced-by-count":2,"title":["Granular computing in privacy-preserving data mining"],"prefix":"10.1109","author":[{"given":"Justin","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Tsau Young","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2005.1547383"},{"key":"14","article-title":"privacy-preserving multi-party association rule mining","author":"zhan","year":"0","journal-title":"Journal of Network and Computer Applications (JNCA) Special issue on Innovations in Agent Collaboration cooperation and Teaming 2005"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(97)00077-8"},{"key":"12","article-title":"privacy-preserving collaborative data mining","author":"zhan","year":"2003","journal-title":"Proc IEEE Foundations and New Directions of Data Mining Workshop"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258637"},{"key":"2","article-title":"granular computing. an introduction","author":"bargiela","year":"0","journal-title":"Kluwer Academic Publishers 2003"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"year":"0","key":"10"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"9","article-title":"a novel composition of secure multiparty protocols based on information theory","author":"shen","year":"2008","journal-title":"Under Review"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"}],"event":{"name":"2008 IEEE International Conference on Granular Computing (GrC-2008)","start":{"date-parts":[[2008,8,26]]},"location":"Hangzhou","end":{"date-parts":[[2008,8,28]]}},"container-title":["2008 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4648793\/4664626\/04664790.pdf?arnumber=4664790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T17:37:29Z","timestamp":1489685849000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4664790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/grc.2008.4664790","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}