{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:22:55Z","timestamp":1760707375310,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,22]],"date-time":"2004-08-22T00:00:00Z","timestamp":1093132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,22]]},"DOI":"10.1145\/1014052.1014126","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"599-604","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":80,"title":["When do data mining results violate privacy?"],"prefix":"10.1145","author":[{"given":"Murat","family":"Kantarcio\u01e7lu","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Jiashun","family":"Jin","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Chris","family":"Clifton","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]}],"member":"320","published-online":{"date-parts":[[2004,8,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_4_1","volume-title":"UCI repository of machine learning databases","author":"Blake C.","year":"1998","unstructured":"C. Blake and C. Merz . UCI repository of machine learning databases , 1998 . C. Blake and C. Merz. UCI repository of machine learning databases, 1998."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining","volume":"14","author":"Du W.","year":"2002","unstructured":"W. Du and Z. Zhan . Building decision tree classifier on private data. In C. Clifton and V. Estivill-Castro, editors , IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining , volume 14 , pages 1 -- 8 , Maebashi City, Japan , Dec. 9 2002 . Australian Computer Society. W. Du and Z. Zhan. Building decision tree classifier on private data. In C. Clifton and V. Estivill-Castro, editors, IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, volume 14, pages 1--8, Maebashi City, Japan, Dec. 9 2002. Australian Computer Society."},{"key":"e_1_3_2_1_6_1","volume-title":"No I.(281):31--50","author":"EC","year":"1995","unstructured":"Directive 95\/46\/ EC of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities , No I.(281):31--50 , Oct. 24 1995 . Directive 95\/46\/EC of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, No I.(281):31--50, Oct. 24 1995."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775080"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772864"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/882082.882102"},{"key":"e_1_3_2_1_10_1","first-page":"37","volume-title":"IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining","volume":"14","author":"Kantarcioglu M.","year":"2002","unstructured":"M. Kantarcioglu and J. Vaidya . An architecture for privacy-preserving mining of client information. In C. Clifton and V. Estivill-Castro, editors , IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining , volume 14 , pages 37 -- 42 , Maebashi City, Japan , Dec. 9 2002 . Australian Computer Society. M. Kantarcioglu and J. Vaidya. An architecture for privacy-preserving mining of client information. In C. Clifton and V. Estivill-Castro, editors, IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, volume 14, pages 37--42, Maebashi City, Japan, Dec. 9 2002. Australian Computer Society."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.45"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/951949.952160"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-004-0148-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287428"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_17_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"1999","unstructured":"I. H. Witten and E. Frank . Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations . Morgan Kaufmann , San Fransisco , Oct. 1999 . I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann, San Fransisco, Oct. 1999."}],"event":{"name":"KDD04: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"],"location":"Seattle WA USA","acronym":"KDD04"},"container-title":["Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014126","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1014052.1014126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:25Z","timestamp":1750264285000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,22]]},"references-count":17,"alternative-id":["10.1145\/1014052.1014126","10.1145\/1014052"],"URL":"https:\/\/doi.org\/10.1145\/1014052.1014126","relation":{},"subject":[],"published":{"date-parts":[[2004,8,22]]},"assertion":[{"value":"2004-08-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}