{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:27:35Z","timestamp":1726759655972},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/wocn.2012.6335531","type":"proceedings-article","created":{"date-parts":[[2012,10,24]],"date-time":"2012-10-24T20:32:30Z","timestamp":1351110750000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Data perturbation and feature selection in preserving privacy"],"prefix":"10.1109","author":[{"given":"Thanveer","family":"Jahan","sequence":"first","affiliation":[]},{"given":"G.","family":"Narsimha","sequence":"additional","affiliation":[]},{"given":"C. V. Guru","family":"Rao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223410"},{"key":"14","first-page":"459","article-title":"Data distortion for privacy protection in a terrorist analysis system","author":"xu","year":"0","journal-title":"Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics 2005"},{"key":"11","first-page":"114","article-title":"Selective Data Distortion via Structural Partition and SSVD for privacy Preseervation","author":"wang","year":"0","journal-title":"Proceedings of the 2006 International Conference on Information & Knowledge Engineering"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1963.1057810"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014120"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"journal-title":"Information Retrieval Data Structures and Algorithms","year":"0","author":"frankes","key":"1"},{"journal-title":"Privacy in Data Mining","year":"0","author":"estvill-castro","key":"10"},{"key":"7","first-page":"86","article-title":"Privacy-Preserving data mining","author":"agrawal","year":"2003","journal-title":"Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/3979.4017"},{"journal-title":"Matrix Computation","year":"1996","author":"golub","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"}],"event":{"name":"2012 Ninth International Conference on Wireless and Optical Communications Networks - (WOCN)","start":{"date-parts":[[2012,9,20]]},"location":"Indore, India","end":{"date-parts":[[2012,9,22]]}},"container-title":["2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6325179\/6331881\/06335531.pdf?arnumber=6335531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T23:48:10Z","timestamp":1490140090000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6335531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wocn.2012.6335531","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}