{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:31:42Z","timestamp":1730259102676,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,8]]},"DOI":"10.1109\/icspis60075.2023.10343672","type":"proceedings-article","created":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T18:40:07Z","timestamp":1702406407000},"page":"71-76","source":"Crossref","is-referenced-by-count":0,"title":["DiffT: A Novel Approach for Privacy Preserving Data Analytics"],"prefix":"10.1109","author":[{"given":"Ketaki","family":"Kadlaskar","sequence":"first","affiliation":[{"name":"National Forensic Sciences University,School of Cybersecurity and Digital Forensics,Gandhinagar,India"}]},{"given":"Mukti","family":"Padhya","sequence":"additional","affiliation":[{"name":"National Forensic Sciences University,School of Cybersecurity and Digital Forensics,Gandhinagar,India"}]}],"member":"263","reference":[{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI48184.2020.9142963"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98636-0_15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1540276.1540279"},{"key":"ref4","article-title":"A Study on k-anonymity, l-diversity, and t-closeness","volume":"17","author":"rajendran","year":"2017","journal-title":"Techniques focusing Medical Data"},{"journal-title":"UN Handbook on Privacy-Preserving Computation Techniques","year":"2023","author":"archer","key":"ref3"},{"key":"ref6","first-page":"86","article-title":"A robust analysis of adversarial attacks on federated learning environments","author":"nair","year":"2022","journal-title":"Computer Standards & Interfaces"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref5","first-page":"246","article-title":"A Homomorphic Encryption Approach to Implementing Two- Party Privacy Preserving Data Mining","volume":"3","author":"oyerinde","year":"2016","journal-title":"International journal of Innovative Science Engineering and Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045700"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65930-5_32"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9377989"}],"event":{"name":"2023 6th International Conference on Signal Processing and Information Security (ICSPIS)","start":{"date-parts":[[2023,11,8]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2023,11,9]]}},"container-title":["2023 6th International Conference on Signal Processing and Information Security (ICSPIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10343388\/10343533\/10343672.pdf?arnumber=10343672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T19:18:34Z","timestamp":1702495114000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10343672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icspis60075.2023.10343672","relation":{},"subject":[],"published":{"date-parts":[[2023,11,8]]}}}