{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:04:51Z","timestamp":1730275491244,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/ispa\/bdcloud\/socialc57177.2022.10241338","type":"proceedings-article","created":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T17:24:50Z","timestamp":1694107490000},"page":"945-952","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering Algorithm"],"prefix":"10.1109","author":[{"given":"Guanghui","family":"Feng","sequence":"first","affiliation":[{"name":"Guangzhou University,School of Computer Science and Cyber Engineering,Guangzhou,China,510006"}]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangzhou University,School of Computer Science and Cyber Engineering,Guangzhou,China,510006"}]},{"given":"Tao","family":"Peng","sequence":"additional","affiliation":[{"name":"Guangzhou University,School of Computer Science and Cyber Engineering,Guangzhou,China,510006"}]},{"given":"Xiaofei","family":"Xing","sequence":"additional","affiliation":[{"name":"Guangzhou University,School of Computer Science and Cyber Engineering,Guangzhou,China,510006"}]},{"given":"Shuhong","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangzhou University,School of Computer Science and Cyber Engineering,Guangzhou,China,510006"}]},{"given":"Peiqiang","family":"Li","sequence":"additional","affiliation":[{"name":"Guangzhou University,School of Computer Science and Cyber Engineering,Guangzhou,China,510006"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1317-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.237"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref31","first-page":"613","article-title":"A set pair k-means clustering algorithm for incomplete information system","volume":"35","author":"zhang","year":"2020","journal-title":"Journal of Data Acquisition and Processing"},{"key":"ref30","first-page":"1141","article-title":"Rough fuzzy k-means clustering algorithm based on hybrid metric and cluster adaptive adjustment","volume":"32","author":"zhang","year":"0","journal-title":"Pattern Recognition and Artificial Intelligence"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936301"},{"key":"ref33","first-page":"100","article-title":"A load clustering algorithm based on discrete wavelet transform and fuzzy k-modes","volume":"39","author":"zhang","year":"2019","journal-title":"Electric Power Automation Equipment"},{"key":"ref10","first-page":"12","article-title":"A density-based clustering method for k-anonymity privacy protection","volume":"8","author":"liu","year":"2017","journal-title":"J Inf Hiding Multimedia Signal Process"},{"key":"ref32","first-page":"2836","article-title":"A weighting k-means clustering approach by integrating intra-cluster and inter-cluster distances","volume":"42","author":"huang","year":"2019","journal-title":"Chinese Journal of Computers"},{"key":"ref2","first-page":"1761","article-title":"Differential privacy under continual observation","volume":"31","author":"liang","year":"2020","journal-title":"Journal of Software"},{"key":"ref1","first-page":"1","article-title":"The privacy-preserving in big data processing and analysis:a literature review","volume":"49","author":"ren","year":"2019","journal-title":"Journal of Northwest University(Natural Science Edition)"},{"key":"ref17","first-page":"363","article-title":"Wang.: Weighted largesocial network data privacy protection method","volume":"57","author":"huang","year":"2020","journal-title":"Journal of Computer research and development"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref19","first-page":"274","article-title":"A high-availability kmodes clustering method based on differential privacy","author":"zhang","year":"2021","journal-title":"International Conference on Algorithms and Architectures for Parallel Processing"},{"key":"ref18","first-page":"1782","article-title":"Interactive queries differential privacy protection model in big data environment","volume":"36","author":"yuan","year":"2019","journal-title":"Application Research of Computers"},{"key":"ref24","first-page":"88","article-title":"Differential privacy protection scheme based on edge betweenness model","volume":"40","author":"huang","year":"2019","journal-title":"Journal on Communications"},{"key":"ref23","first-page":"50","article-title":"K-means clustering algorithm combining max-min distance and weighted density","volume":"56","author":"ma","year":"2020","journal-title":"Computer Engineering and Applications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68542-7_7"},{"key":"ref25","first-page":"1568","article-title":"Differential privacy protection algorithm for large social network","volume":"41","author":"wang","year":"2020","journal-title":"Computer Engineering and Design"},{"key":"ref20","first-page":"121","article-title":"Study on density parameter and centerreplacement combined K-means and new clustering validity index","volume":"49","author":"zhang","year":"2022","journal-title":"Computer Science"},{"key":"ref22","first-page":"1219","article-title":"Improved k-means clustering algorithm based on feature selection and removal on target point","volume":"34","author":"yang","year":"2019","journal-title":"Control and Decision"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-0468-4_17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref27","first-page":"2597","article-title":"Optimal differential privacy composition for exponential mechanisms","author":"dong","year":"2020","journal-title":"International Conference on Machine Learning"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842773"},{"key":"ref8","first-page":"139","article-title":"Anatomy: Simple and effective privacy preservation","author":"xiao","year":"2006","journal-title":"Proceedings of the 32nd international conference on Very large data bases"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14778\/2336664.2336668"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934179"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.22581\/muet1982.2001.20"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0035-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025193"}],"event":{"name":"2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","start":{"date-parts":[[2022,12,17]]},"location":"Melbourne, Australia","end":{"date-parts":[[2022,12,19]]}},"container-title":["2022 IEEE Intl Conf on Parallel &amp; Distributed Processing with Applications, Big Data &amp; Cloud Computing, Sustainable Computing &amp; Communications, Social Computing &amp; Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10070589\/10070615\/10241338.pdf?arnumber=10241338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:48:56Z","timestamp":1695664136000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10241338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ispa\/bdcloud\/socialc57177.2022.10241338","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]}}}