{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:46:46Z","timestamp":1759132006758,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,8]]},"DOI":"10.1109\/ijcnn.2007.4371189","type":"proceedings-article","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T15:35:49Z","timestamp":1194363349000},"page":"1554-1559","source":"Crossref","is-referenced-by-count":10,"title":["A Privacy Preserving Probabilistic Neural Network for Horizontally Partitioned Databases"],"prefix":"10.1109","author":[{"given":"Jimmy","family":"Secretan","sequence":"first","affiliation":[]},{"given":"Michael","family":"Georgiopoulos","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Castro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183757"},{"key":"ref11","article-title":"Secure matrix addition","author":"yu","year":"2004","journal-title":"University of Iowa Tech Rep UIOWA-CS-04-04"},{"key":"ref12","article-title":"Methods for parallelizing the probabilistic neural network on a beowulf cluster computer","author":"secretan","year":"2006","journal-title":"World Congress on Computational Intelligence"},{"key":"ref13","first-page":"104","article-title":"On private scalar product computation for privacy-preserving data mining","volume":"3506","author":"goethals","year":"0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref15","first-page":"388","article-title":"Tools for privacy preserving kernel methods in data mining","author":"haiping","year":"2006","journal-title":"AIA&#x2019;06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications"},{"journal-title":"Secure Multi-Party Computation","year":"1998","author":"goldreich","key":"ref16"},{"journal-title":"The MPICH Home Page","year":"2007","key":"ref17"},{"journal-title":"NTL A library for doing number theory","year":"2007","key":"ref18"},{"journal-title":"Paillier java code","year":"2007","author":"liu","key":"ref19"},{"journal-title":"R2 home","year":"2007","key":"ref4"},{"key":"ref3","article-title":"Breast cancer diagnosis using statistical neural networks","author":"kiyan","year":"2003","journal-title":"Turkish Symposium on Artificial Intelligence and Neural Networks-TAINN 2003"},{"key":"ref6","first-page":"1","article-title":"Building decision tree classifier on private data","volume":"14","author":"du","year":"2002","journal-title":"IEEE international conference on data mining workshop on privacy security and data mining"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"journal-title":"The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","article-title":"Privacy-Preserving K-Means Clustering over Vertically Partitioned Data","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.59"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704472"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(90)90049-Q"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1007\/11731139_74","article-title":"Privacy-preserving svm classification on vertically partitioned data","volume":"3918","author":"yu","year":"2006","journal-title":"Proceedings of PAKDD '06 ser Lecture Notes in Computer Science"}],"event":{"name":"2007 International Joint Conference on Neural Networks","start":{"date-parts":[[2007,8,12]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2007,8,17]]}},"container-title":["2007 International Joint Conference on Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4370890\/4370891\/04371189.pdf?arnumber=4371189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T20:20:57Z","timestamp":1497730857000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4371189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2007.4371189","relation":{},"ISSN":["1098-7576"],"issn-type":[{"type":"print","value":"1098-7576"}],"subject":[],"published":{"date-parts":[[2007,8]]}}}