{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:16:25Z","timestamp":1729649785133,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024639","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T16:26:54Z","timestamp":1504542414000},"page":"890-897","source":"Crossref","is-referenced-by-count":9,"title":["Privacy-preserving text mining as a service"],"prefix":"10.1109","author":[{"given":"Gianpiero","family":"Costantino","sequence":"first","affiliation":[]},{"given":"Antonio","family":"La Marra","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]},{"given":"Mina","family":"Sheikhalishahi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"ref30","first-page":"60","article-title":"Machine learning techniques in spam filtering","volume":"3","author":"tretyakov","year":"2004","journal-title":"Data Mining Problem-Oriented Seminar"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1007\/978-3-662-44371-2_31","article-title":"Algorithms in helib","author":"halevi","year":"2014","journal-title":"Advances in Cryptology - CRYPTO 2014 &#x2013; 34th Annual Cryptology Conference"},{"key":"ref11","first-page":"3","author":"harris","year":"1981","journal-title":"Distributional structure"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/BFb0026683","article-title":"Text categorization with suport vector machines: Learning with many relevant features","author":"joachims","year":"1998","journal-title":"Proceedings of ECML-98 10th European Conference on Machine Learning"},{"key":"ref13","article-title":"Failedrevolutions: Using twitter to study the antecedents of isis support","author":"magdy","year":"2015","journal-title":"CoRR abs\/1503 02401"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2012.15"},{"key":"ref15","article-title":"Modeling privacy aware information sharing systems: A formal and general approach","author":"martinelli","year":"2016","journal-title":"15th IEEE International Conference on Trust Security and Privacy in Computing and Communications"},{"key":"ref16","article-title":"Privacy-preserving multi-document summarization","author":"marujo","year":"2015","journal-title":"CoRR"},{"journal-title":"A comparison of event models for naive bayes text classification","year":"1998","author":"mccallum","key":"ref17"},{"key":"ref18","article-title":"Spam filtering with naive bayes - which naive bayes?","author":"metsis","year":"2006","journal-title":"Conference on Email and Anti Spam (CEAS)"},{"key":"ref19","first-page":"90","article-title":"Clustering spam emails into campaigns","author":"mina","year":"2015","journal-title":"ICISSP 1st International Conference on Information Systems Security and Privacy ESEO"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24858-5_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.26"},{"key":"ref27","first-page":"161","article-title":"Privacy-aware data sharing in a tree-based categorical clustering algorithm","author":"sheikhalishahi","year":"2016","journal-title":"Intemationsal Symposium on Foundations and Practice of Security"},{"key":"ref3","first-page":"509","article-title":"Learning to extract symbolic knowledge from the world wide web","author":"craven","year":"1998","journal-title":"Proceedings of the fifteenth national\/tenth conference on Artificial intelligence\/Innovative applications of artificial intelligence"},{"key":"ref6","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref29","article-title":"Fast and effective clustering of spam emails based on structural similarity","author":"sheikhalishahi","year":"2015","journal-title":"The 8th International Symposium on Foundations and Practice of Security"},{"key":"ref5","first-page":"1","author":"dwork","year":"2006","journal-title":"Differential Privacy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546914"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref9","first-page":"175","author":"giudici","year":"2009","journal-title":"Market basket analysis"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972771.6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007692713085"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1023\/A:1007369909943","article-title":"Learning and revising user profiles: The identification of interesting web sites","volume":"27","author":"pazzani","year":"1997","journal-title":"Machine Learning"},{"key":"ref21","first-page":"43","article-title":"Privacy preserving frequent itemset mining","author":"oliveira","year":"2002","journal-title":"Proceedings of the IEEE International Conference on Privacy Security and Data Mining - Volume 14 CRPIT &#x2018;14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711449"},{"journal-title":"Email Statistics Report 2013-2017","year":"2013","author":"radicati","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"journal-title":"G TUR Web and Information Security","year":"2006","author":"saygin","key":"ref25"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2017,7,3]]},"location":"Heraklion, Greece","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024639.pdf?arnumber=8024639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T23:52:06Z","timestamp":1570060326000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024639","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}