{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:43Z","timestamp":1750308223906,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,22]],"date-time":"2004-08-22T00:00:00Z","timestamp":1093132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,22]]},"DOI":"10.1145\/1014052.1014153","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"761-766","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Optimal randomization for privacy preserving data mining"],"prefix":"10.1145","author":[{"given":"Yu","family":"Zhu","sequence":"first","affiliation":[{"name":"Purdue University, W. Lafayette, IN"}]},{"given":"Lei","family":"Liu","sequence":"additional","affiliation":[{"name":"Purdue University, W. Lafayette, IN"}]}],"member":"320","published-online":{"date-parts":[[2004,8,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(94)00119-G"},{"key":"e_1_3_2_1_4_1","volume-title":"The end of Privacy","author":"Economist The","year":"1999","unstructured":"The Economist . The end of Privacy . May , 1999 .]] The Economist. The end of Privacy. May, 1999.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775080"},{"key":"e_1_3_2_1_7_1","first-page":"541","article-title":"Global behavior of deconvolution kernel estimates","volume":"1","author":"Fan J.","year":"1991","unstructured":"J. Fan . Global behavior of deconvolution kernel estimates . Statistica Sinica , 1 : 541 -- 551 , 1991 .]] J. Fan. Global behavior of deconvolution kernel estimates. Statistica Sinica, 1:541--551, 1991.]]","journal-title":"Statistica Sinica"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176348248"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/951949.952160"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - Crypto2000","author":"Lindell Y.","year":"2000","unstructured":"Y. Lindell and B. Pinkas . Privacy preserving data mining . In Advances in Cryptology - Crypto2000 , Lecture Notes in Computer Science , volume 1880 , 2000 .]] Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology - Crypto2000, Lecture Notes in Computer Science, volume 1880, 2000.]]"},{"key":"e_1_3_2_1_11_1","volume-title":"NSF-CBMS Regional Conference Series in Probability and Statistics","author":"Lindsay B.G.","year":"1995","unstructured":"B.G. Lindsay . Mixture Models: Theory, Geometry and Applications , NSF-CBMS Regional Conference Series in Probability and Statistics , Vol. 5 . Alexandria, Virginia : Institute of Mathematical Statistics and the American Statistical Association , 1995 .]] B.G. Lindsay. Mixture Models: Theory, Geometry and Applications, NSF-CBMS Regional Conference Series in Probability and Statistics, Vol. 5. Alexandria, Virginia: Institute of Mathematical Statistics and the American Statistical Association, 1995.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/1026034"},{"key":"e_1_3_2_1_13_1","volume-title":"DS","author":"Thearling K.","year":"1998","unstructured":"K. Thearling . Data mining and privacy: a conflict in making . DS , November 1998 .]] K. Thearling. Data mining and privacy: a conflict in making. DS, November 1998.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"}],"event":{"name":"KDD04: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"],"location":"Seattle WA USA","acronym":"KDD04"},"container-title":["Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014153","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1014052.1014153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:25Z","timestamp":1750264285000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014153"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,22]]},"references-count":14,"alternative-id":["10.1145\/1014052.1014153","10.1145\/1014052"],"URL":"https:\/\/doi.org\/10.1145\/1014052.1014153","relation":{},"subject":[],"published":{"date-parts":[[2004,8,22]]},"assertion":[{"value":"2004-08-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}