{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T11:47:30Z","timestamp":1772106450159,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,22]],"date-time":"2004-08-22T00:00:00Z","timestamp":1093132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,22]]},"DOI":"10.1145\/1014052.1014145","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"713-718","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":130,"title":["Privacy-preserving Bayesian network structure computation on distributed heterogeneous data"],"prefix":"10.1145","author":[{"given":"Rebecca","family":"Wright","sequence":"first","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ"}]},{"given":"Zhiqiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ"}]}],"member":"320","published-online":{"date-parts":[[2004,8,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844110"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/645933.756665"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/383962.384047"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.31"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-1-4612-2404-4_12","volume-title":"Learning from Data: Artificial Intelligence and Statistics V","author":"Chickering David Maxwell","year":"1996","unstructured":"David Maxwell Chickering . Learning Bayesian networks is NP-complete . In D. Fisher and H.J. Lenz, editors, Learning from Data: Artificial Intelligence and Statistics V , pages 121 -- 130 . Springer-Verlag , 1996 .]] David Maxwell Chickering. Learning Bayesian networks is NP-complete. In D. Fisher and H.J. Lenz, editors, Learning from Data: Artificial Intelligence and Statistics V, pages 121--130. Springer-Verlag, 1996.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022649401552"},{"key":"e_1_3_2_1_9_1","first-page":"103","volume-title":"Proc. 17th Annual Computer Security Applications Conference","author":"Du W.","year":"2001","unstructured":"W. Du and M. Atallah . Privacy-preserving cooperative statistical analysis . In Proc. 17th Annual Computer Security Applications Conference , pages 103 -- 110 , 2001 .]] W. Du and M. Atallah. Privacy-preserving cooperative statistical analysis. In Proc. 17th Annual Computer Security Applications Conference, pages 103--110, 2001.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646254.684251"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Advances in Cryptology --- EUROCRYPT","author":"Freedman M.","year":"2004","unstructured":"M. Freedman , K. Nissim , and B. Pinkas . Efficient private matching and set intersection . In Advances in Cryptology --- EUROCRYPT 2004 , LNCS 3027, pages 1 -- 19 . Springer-Verlag , 2004.]] M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Advances in Cryptology --- EUROCRYPT 2004, LNCS 3027, pages 1--19. Springer-Verlag, 2004.]]"},{"key":"e_1_3_2_1_12_1","volume-title":"Secure multi-party computation.","author":"Goldreich O.","year":"1998","unstructured":"O. Goldreich . Secure multi-party computation. available at http:\/\/philby.ucsd.edu, 1998 . unpublished manuscript.]] O. Goldreich. Secure multi-party computation. available at http:\/\/philby.ucsd.edu, 1998. unpublished manuscript.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Microsoft Research","author":"Heckerman D.","year":"1995","unstructured":"D. Heckerman . A tutorial on learning with Bayesian networks. Technical report , Microsoft Research , Redmond, Washington , 1995 . Revised June 96.]] D. Heckerman. A tutorial on learning with Bayesian networks. Technical report, Microsoft Research, Redmond, Washington, 1995. Revised June 96.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"The health insurance portability and accountability act of","author":"HIPAA.","year":"1996","unstructured":"HIPAA. The health insurance portability and accountability act of 1996 , October 1998. Available at www.cms.hhs.gov\/hipaa\/.]] HIPAA. The health insurance portability and accountability act of 1996, October 1998. Available at www.cms.hhs.gov\/hipaa\/.]]"},{"key":"e_1_3_2_1_15_1","first-page":"24","volume-title":"The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery","author":"Kantarcioglu M.","year":"2002","unstructured":"M. Kantarcioglu and C. Clifton . Privacy-preserving distributed mining of association rules on horizontally partitioned data . In The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery , pages 24 -- 31 , June 2002 .]] M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. In The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, pages 24--31, June 2002.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE Workshop on Privacy Preserving Data Mining","author":"Kantarcioglu Murat","year":"2003","unstructured":"Murat Kantarcioglu and Jaideep Vaidya . Privacy preserving naive Bayes classifier for horizontally partitioned data . In IEEE Workshop on Privacy Preserving Data Mining , 2003 .]] Murat Kantarcioglu and Jaideep Vaidya. Privacy preserving naive Bayes classifier for horizontally partitioned data. In IEEE Workshop on Privacy Preserving Data Mining, 2003.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"Advances in Distributed and Parallel Knowledge Discovery","author":"Kargupta Hillol","year":"2000","unstructured":"Hillol Kargupta and Philip Chan . Advances in Distributed and Parallel Knowledge Discovery . MIT\/AAAI Press , 2000 .]] Hillol Kargupta and Philip Chan. Advances in Distributed and Parallel Knowledge Discovery. MIT\/AAAI Press, 2000.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"e_1_3_2_1_19_1","first-page":"223","volume-title":"Advances in Cryptography --- EUROCRYPT 99","author":"Paillier P.","year":"1999","unstructured":"P. Paillier . Public-key cryptosystems based on composite degree residue classes . In Advances in Cryptography --- EUROCRYPT 99 , pages 223 -- 238 , 1999 .]] P. Paillier. Public-key cryptosystems based on composite degree residue classes. In Advances in Cryptography --- EUROCRYPT 99, pages 223--238, 1999.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2753"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"}],"event":{"name":"KDD04: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Seattle WA USA","acronym":"KDD04","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1014052.1014145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:25Z","timestamp":1750264285000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,22]]},"references-count":24,"alternative-id":["10.1145\/1014052.1014145","10.1145\/1014052"],"URL":"https:\/\/doi.org\/10.1145\/1014052.1014145","relation":{},"subject":[],"published":{"date-parts":[[2004,8,22]]},"assertion":[{"value":"2004-08-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}