{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:26:23Z","timestamp":1761675983135,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,12]],"date-time":"2012-08-12T00:00:00Z","timestamp":1344729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,12]]},"DOI":"10.1145\/2339530.2339695","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"1041-1049","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Differential identifiability"],"prefix":"10.1145","author":[{"given":"Jaewoo","family":"Lee","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Chris","family":"Clifton","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,8,12]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-70992-5","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms, ser. Advances in Database Systems","author":"Aggarwal C. C.","year":"2008","unstructured":"C. C. Aggarwal and P. S. Yu , Eds. , Privacy-Preserving Data Mining: Models and Algorithms, ser. Advances in Database Systems . Springer , 2008 , vol. 34 . C. C. Aggarwal and P. S. Yu, Eds., Privacy-Preserving Data Mining: Models and Algorithms, ser. Advances in Database Systems. Springer, 2008, vol. 34."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1145\/1835804.1835869"},{"key":"e_1_3_2_2_3_1","first-page":"289","volume-title":"Privacy-preserving logistic regression,\" in Proceeding of the 22nd Annual Conference on Neural Information Processing Systems (NIPS)","author":"Chaudhuri K.","year":"2008","unstructured":"K. Chaudhuri and C. Monteleoni , \" Privacy-preserving logistic regression,\" in Proceeding of the 22nd Annual Conference on Neural Information Processing Systems (NIPS) , 2008 , pp. 289 -- 296 . K. Chaudhuri and C. Monteleoni, \"Privacy-preserving logistic regression,\" in Proceeding of the 22nd Annual Conference on Neural Information Processing Systems (NIPS), 2008, pp. 289--296."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.1145\/2020408.2020598"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_5_1","DOI":"10.1145\/1989323.1989347"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_6_1","DOI":"10.1007\/11681878_14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_8_1","first-page":"281","article-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","year":"1995","unstructured":"\" Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data ,\" Official Journal of the European Communities , vol. No I ., no. 281 , pp. 31--50, Oct. 24 1995 . http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/law\/index_en.htm. \"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data,\" Official Journal of the European Communities, vol. No I., no. 281, pp. 31--50, Oct. 24 1995. http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/law\/index_en.htm.","journal-title":"Official Journal of the European Communities"},{"key":"e_1_3_2_2_9_1","volume-title":"UCI machine learning repository","author":"Frank A.","year":"2010","unstructured":"A. Frank and A. Asuncion , \" UCI machine learning repository ,\" 2010 . http:\/\/archive.ics.uci.edu\/ml. A. Frank and A. Asuncion, \"UCI machine learning repository,\" 2010. http:\/\/archive.ics.uci.edu\/ml."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.1145\/1835804.1835868"},{"issue":"157","key":"e_1_3_2_2_11_1","first-page":"53","article-title":"Standard for privacy of individually identifiable health information","volume":"67","year":"2002","unstructured":"\" Standard for privacy of individually identifiable health information ,\" Federal Register , vol. 67 , no. 157 , pp. 53 - 181 --53-273, Aug. 14 2002 . http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/privacyrule\/index.html. \"Standard for privacy of individually identifiable health information,\" Federal Register, vol. 67, no. 157, pp. 53-181--53-273, Aug. 14 2002. http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/privacyrule\/index.html.","journal-title":"Federal Register"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_12_1","DOI":"10.1145\/1989323.1989345"},{"key":"e_1_3_2_2_13_1","first-page":"325","volume-title":"X. Lai, J. Zhou, and H. Li, Eds","author":"Lee J.","year":"2011","unstructured":"J. Lee and C. Clifton , \" How much is enough? choosing \u03b5 for differential privacy,\" in Information Security, ser. Lecture Notes in Computer Science , X. Lai, J. Zhou, and H. Li, Eds . Springer Berlin \/ Heidelberg , 2011 , vol. 7001 , pp. 325 -- 340 . J. Lee and C. Clifton, \"How much is enough? choosing \u03b5 for differential privacy,\" in Information Security, ser. Lecture Notes in Computer Science, X. Lai, J. Zhou, and H. Li, Eds. Springer Berlin \/ Heidelberg, 2011, vol. 7001, pp. 325--340."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.1145\/1217299.1217302"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.1145\/1810891.1810916"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1145\/1557019.1557090"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1145\/2020408.2020487"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1145\/1247480.1247554"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1109\/69.971193"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_2_21_1","volume-title":"Privacy Preserving Data Mining, ser. Advances in Information Security","author":"Vaidya J.","year":"2006","unstructured":"J. Vaidya , C. Clifton , and M. Zhu , Privacy Preserving Data Mining, ser. Advances in Information Security . Springer , 2006 , vol. 19 . http:\/\/www.springer.com\/computer\/database+management+%26+information+retrieval\/book\/978-0-387-25886-7. J. Vaidya, C. Clifton, and M. Zhu, Privacy Preserving Data Mining, ser. Advances in Information Security. Springer, 2006, vol. 19. http:\/\/www.springer.com\/computer\/database+management+%26+information+retrieval\/book\/978-0-387-25886-7."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1109\/TKDE.2010.247"},{"key":"e_1_3_2_2_23_1","first-page":"1","volume-title":"Jun. 2011","author":"Zhang N.","unstructured":"N. Zhang , M. Li , and W. Lou , \" Distributed data mining with differential privacy,\" in 2011 IEEE International Conference on Communications (ICC) , Jun. 2011 , pp. 1 -- 5 . N. Zhang, M. Li, and W. Lou, \"Distributed data mining with differential privacy,\" in 2011 IEEE International Conference on Communications (ICC), Jun. 2011, pp. 1--5."}],"event":{"sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"acronym":"KDD '12","name":"KDD '12: The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Beijing China"},"container-title":["Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2339530.2339695","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2339530.2339695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:13Z","timestamp":1750239253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2339530.2339695"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,12]]},"references-count":23,"alternative-id":["10.1145\/2339530.2339695","10.1145\/2339530"],"URL":"https:\/\/doi.org\/10.1145\/2339530.2339695","relation":{},"subject":[],"published":{"date-parts":[[2012,8,12]]},"assertion":[{"value":"2012-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}