{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T01:01:50Z","timestamp":1774054910596,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,4,23]],"date-time":"2006-04-23T00:00:00Z","timestamp":1145750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,4,23]]},"DOI":"10.1145\/1141277.1141415","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"603-610","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":136,"title":["Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data"],"prefix":"10.1145","author":[{"given":"Hwanjo","family":"Yu","sequence":"first","affiliation":[{"name":"University of Iowa, Iowa City"}]},{"given":"Xiaoqian","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Iowa, Iowa City"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark"}]}],"member":"320","published-online":{"date-parts":[[2006,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"SPECT dataset. ftp:\/\/ftp\/ics.uci.edu\/pub\/machine-learning-databases\/spect\/.]]  SPECT dataset. ftp:\/\/ftp\/ics.uci.edu\/pub\/machine-learning-databases\/spect\/.]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/345662"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872181"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/850782.850784"},{"key":"e_1_3_2_1_8_1","unstructured":"Directive 95\/46\/EC of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities No I.(281):31--50 Oct. 24 1995.]]  Directive 95\/46\/EC of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities No I.(281):31--50 Oct. 24 1995.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775080"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502527"},{"key":"e_1_3_2_1_11_1","unstructured":"X. Ge. C++ code: SMO training of SVM. http:\/\/www.datalab.uci.edu\/people\/xge\/svm\/ 2001.]]  X. Ge. C++ code: SMO training of SVM. http:\/\/www.datalab.uci.edu\/people\/xge\/svm\/ 2001.]]"},{"key":"e_1_3_2_1_12_1","first-page":"104","volume-title":"The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004","volume":"3506","author":"Goethals B.","year":"2004"},{"key":"e_1_3_2_1_13_1","unstructured":"Standard for privacy of individually identifiable health information. Federal Register 66(40) Feb. 28 2001.]]  Standard for privacy of individually identifiable health information. Federal Register 66(40) Feb. 28 2001.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/850943.853036"},{"key":"e_1_3_2_1_15_1","unstructured":"X. Jiang and H. Yu. SVM-JAVA: A Java implementation of the SMO (sequential minimal optimization) for training SVM. Computer Science Department University of Iowa http:\/\/hwanjoyu.org\/svm-java 2005.]]  X. Jiang and H. Yu. SVM-JAVA: A Java implementation of the SMO (sequential minimal optimization) for training SVM. Computer Science Department University of Iowa http:\/\/hwanjoyu.org\/svm-java 2005.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.45"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/951949.952160"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0933-3657(01)00082-3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"X. Lin C. Clifton and M. Zhu. Privacy preserving clustering with distributed EM mixture modeling. Knowledge and Information Systems to appear 2004.]]  X. Lin C. Clifton and M. Zhu. Privacy preserving clustering with distributed EM mixture modeling. Knowledge and Information Systems to appear 2004.]]","DOI":"10.1007\/s10115-004-0148-7"},{"key":"e_1_3_2_1_20_1","first-page":"36","volume-title":"Advances in Cryptology--CRYPTO","author":"Lindell Y.","year":"2000"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/548089"},{"key":"e_1_3_2_1_23_1","volume-title":"Advances in Kernel Methods: Support Vector Machines. MIT Press","author":"Platt J.","year":"1998"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. the Workshop on Privacy and Security Aspects of Data Mining at the Int. Conf. on Data Mining","author":"Ravikumar P.","year":"2004"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287428"},{"key":"e_1_3_2_1_26_1","volume-title":"West Lafayette","author":"Vaidya J.","year":"2004"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.59"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1239367.1239368"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1239367.1239368"},{"key":"e_1_3_2_1_32_1","unstructured":"V. N. Vapnik. Statistical Learning Theory. John Wiley and Sons 1998.]]  V. N. Vapnik. Statistical Learning Theory. John Wiley and Sons 1998.]]"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014145"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956784"},{"key":"e_1_3_2_1_35_1","volume-title":"Int. Conf. Data Mining (ICDM'2)","author":"Yu H.","year":"2002"},{"key":"e_1_3_2_1_36_1","unstructured":"H. Yu and J. Vaidya. Privacy-preserving linear SVM classification. Submitted for publication 2005.]]  H. Yu and J. Vaidya. Privacy-preserving linear SVM classification. Submitted for publication 2005.]]"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"H. Yu J. Vaidya and X. Jiang. Privacy preserving svm classification on vertically partitioned data. Submitted for publication 2005.]]  H. Yu J. Vaidya and X. Jiang. Privacy preserving svm classification on vertically partitioned data. Submitted for publication 2005.]]","DOI":"10.1007\/11535706_11"}],"event":{"name":"SAC06: The 2006 ACM Symposium on Applied Computing","location":"Dijon France","acronym":"SAC06","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 2006 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141415","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1141277.1141415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:31Z","timestamp":1750259191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141415"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4,23]]},"references-count":37,"alternative-id":["10.1145\/1141277.1141415","10.1145\/1141277"],"URL":"https:\/\/doi.org\/10.1145\/1141277.1141415","relation":{},"subject":[],"published":{"date-parts":[[2006,4,23]]},"assertion":[{"value":"2006-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}