{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:40:26Z","timestamp":1762004426530,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,30]],"date-time":"2012-03-30T00:00:00Z","timestamp":1333065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shenzhen Fundamental Research Project","award":["JC201005270342A"],"award-info":[{"award-number":["JC201005270342A"]}]},{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2010DFA92720"],"award-info":[{"award-number":["2010DFA92720"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,30]]},"DOI":"10.1145\/2320765.2320819","type":"proceedings-article","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T11:53:15Z","timestamp":1341316395000},"page":"177-185","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Privacy preserving distributed DBSCAN clustering"],"prefix":"10.1145","author":[{"given":"Jinfei","family":"Liu","sequence":"first","affiliation":[{"name":"University of Science and Technology of China"}]},{"given":"Joshua Zhexue","family":"Huang","sequence":"additional","affiliation":[{"name":"Shenzhen Institutes of Advanced Technology"}]},{"given":"Jun","family":"Luo","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, China"}]},{"given":"Li","family":"Xiong","sequence":"additional","affiliation":[{"name":"Emory University, Atlanta"}]}],"member":"320","published-online":{"date-parts":[[2012,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/304182.304187"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.238015"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956810"},{"key":"e_1_3_2_1_5_1","first-page":"226","volume-title":"KDD","author":"Ester M.","year":"1996","unstructured":"M. Ester , H.-P. Kriegel , J. Sander , and X. Xu . A density-based algorithm for discovering clusters in large spatial databases with noise . In KDD , pages 226 -- 231 , 1996 . M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A density-based algorithm for discovering clusters in large spatial databases with noise. In KDD, pages 226--231, 1996."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of cryptography: Basic applications","author":"Goldreich O.","year":"2004","unstructured":"O. Goldreich . Foundations of cryptography: Basic applications , volume 2 . Cambridge Univ Pr , 2004 . O. Goldreich. Foundations of cryptography: Basic applications, volume 2. Cambridge Univ Pr, 2004."},{"key":"e_1_3_2_1_7_1","first-page":"58","volume-title":"KDD","author":"Hinneburg A.","year":"1998","unstructured":"A. Hinneburg and D. A. Keim . An efficient approach to clustering in large multimedia databases with noise . In KDD , pages 58 -- 65 , 1998 . A. Hinneburg and D. A. Keim. An efficient approach to clustering in large multimedia databases with noise. In KDD, pages 58--65, 1998."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081942"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1421171.1421180"},{"issue":"3","key":"e_1_3_2_1_10_1","first-page":"177","volume":"15","author":"Lindell Y.","year":"2002","unstructured":"Y. Lindell and B. Pinkas . Privacy preserving data mining. J. Cryptology , 15 ( 3 ): 177 -- 206 , 2002 . Y. Lindell and B. Pinkas. Privacy preserving data mining. J. Cryptology, 15(3):177--206, 2002.","journal-title":"Privacy preserving data mining. J. Cryptology"},{"key":"e_1_3_2_1_11_1","first-page":"144","volume-title":"VLDB","author":"Ng R. T.","year":"1994","unstructured":"R. T. Ng and J. Han . Efficient and effective clustering methods for spatial data mining . In VLDB , pages 144 -- 155 , 1994 . R. T. Ng and J. Han. Efficient and effective clustering methods for spatial data mining. In VLDB, pages 144--155, 1994."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2006.75"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"ICDT '12: 15th International Conference on Database Theory","acronym":"ICDT '12","location":"Berlin Germany"},"container-title":["Proceedings of the 2012 Joint EDBT\/ICDT Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2320765.2320819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2320765.2320819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:49Z","timestamp":1750277689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2320765.2320819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,30]]},"references-count":16,"alternative-id":["10.1145\/2320765.2320819","10.1145\/2320765"],"URL":"https:\/\/doi.org\/10.1145\/2320765.2320819","relation":{},"subject":[],"published":{"date-parts":[[2012,3,30]]},"assertion":[{"value":"2012-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}