{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:58:18Z","timestamp":1725706698837},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/ic3.2013.6612175","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:38:09Z","timestamp":1380652689000},"page":"124-129","source":"Crossref","is-referenced-by-count":2,"title":["Privacy preserving classification by using modified C4.5"],"prefix":"10.1109","author":[{"given":"Ranjan","family":"Baghel","sequence":"first","affiliation":[]},{"given":"Maitreyee","family":"Dutta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"36","article-title":"Privacy-preserving data mining","author":"lindell","year":"2000","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"1","first-page":"477","article-title":"Improved use of continuous attributes in C4. 5","author":"quinlan","year":"1996","journal-title":"Journal of Artificial Intelligence Research"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.226"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.45.10.1399"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"8","article-title":"C4. 5: Programs for machine learning","author":"quinlan","year":"1993","journal-title":"Morgan Kaufmann Publishers"}],"event":{"name":"2013 Sixth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2013,8,8]]},"location":"Noida, India","end":{"date-parts":[[2013,8,10]]}},"container-title":["2013 Sixth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6595807\/6612154\/06612175.pdf?arnumber=6612175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T02:12:20Z","timestamp":1490235140000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6612175\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/ic3.2013.6612175","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}