{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:57Z","timestamp":1750307097899,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381865","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"784-788","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Fuzzy based privacy preserving classification of data streams"],"prefix":"10.1145","author":[{"given":"P.","family":"Rajesh","sequence":"first","affiliation":[{"name":"VVIT, Nambur, A. P, India"}]},{"given":"G.","family":"Narisimha","sequence":"additional","affiliation":[{"name":"JNTUH, Karimnagar, A. P, India"}]},{"given":"Ch.","family":"Rupa","sequence":"additional","affiliation":[{"name":"VVIT, Nambur, A. P, India"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"volume-title":"Data mining concepts and techniques","author":"Jiaweihan","key":"e_1_3_2_1_1_1","unstructured":"Jiaweihan , Micheline Kamber. Data mining concepts and techniques . Second edition, Elsevier , 467--468. Jiaweihan, Micheline Kamber. Data mining concepts and techniques. Second edition, Elsevier, 467--468."},{"key":"e_1_3_2_1_2_1","volume-title":"Hang yang","author":"Simon Fong","year":"2011","unstructured":"Simon Fong , Hang yang . 2011 . The six technical gaps between intelligent applications and real time data mining: A critical review. In journal of emerging technologies in web intelligence, 3, 2 (Mar .2011). Simon Fong, Hang yang. 2011. The six technical gaps between intelligent applications and real time data mining: A critical review. In journal of emerging technologies in web intelligence, 3, 2 (Mar.2011)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083784.1083789"},{"key":"e_1_3_2_1_4_1","volume-title":"Tamkang journal of science and engineering, 12, 3, 321--330","author":"Ching","year":"2009","unstructured":"Ching -ming, Chao ., Po -zung, Chen ., and Chu , Haosun. 2009. Privacy preserving classification of data . In Tamkang journal of science and engineering, 12, 3, 321--330 , ( 2009 ). Ching-ming, Chao., Po-zung, Chen., and Chu, Haosun. 2009. Privacy preserving classification of data. In Tamkang journal of science and engineering, 12, 3, 321--330, (2009)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.69"},{"key":"e_1_3_2_1_6_1","volume-title":"D., Statstream.","author":"Zhu","year":"2002","unstructured":"Zhu , y., and Shasha , D., Statstream. 2002 . Statistical monitoring of thousands of data streams in real time. In proceedings of VLDB , (2002). Zhu, y., and Shasha, D., Statstream. 2002. Statistical monitoring of thousands of data streams in real time. In proceedings of VLDB, (2002)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/543613.543615"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"e_1_3_2_1_11_1","volume-title":"the proceedings of VLOD conference","author":"Aggrawal C.","year":"2004","unstructured":"Aggrawal , C. 2004 . K-anonymity and the curse of dimensionality . In the proceedings of VLOD conference , (2004). Aggrawal, C. 2004. K-anonymity and the curse of dimensionality. In the proceedings of VLOD conference, (2004)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_12"},{"key":"e_1_3_2_1_14_1","volume-title":"proceedings of ICDE conference","author":"Sun J.","year":"2007","unstructured":"Sun , Lif. J. , Papadimitrious , S. , Mihaila , G. , Stanoi , I. 2007 . Hiding in the crowed privacy preserving on evolving streams through correlation tracking . In proceedings of ICDE conference , (2007). Sun, Lif. J., Papadimitrious, S., Mihaila, G., Stanoi, I. 2007.Hiding in the crowed privacy preserving on evolving streams through correlation tracking. In proceedings of ICDE conference, (2007)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772865"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956778"},{"volume-title":"Fuzzy logic with Engineering Applications","author":"Timothy","key":"e_1_3_2_1_17_1","unstructured":"Timothy J-Ross. Fuzzy logic with Engineering Applications . Second edition, Wiley India edition, 96--99. Timothy J-Ross. Fuzzy logic with Engineering Applications. Second edition, Wiley India edition, 96--99."},{"volume-title":"Principles of Real Analysis","author":"Gupta S. L.","key":"e_1_3_2_1_18_1","unstructured":"Gupta , S. L. Principles of Real Analysis . Second edition, 2.20--2.22. Gupta, S. L. Principles of Real Analysis. Second edition, 2.20--2.22."}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":18,"alternative-id":["10.1145\/2381716.2381865","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381865","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}