{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:52Z","timestamp":1750308592568,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,13]],"date-time":"2016-03-13T00:00:00Z","timestamp":1457827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,13]]},"DOI":"10.1145\/2888451.2888462","type":"proceedings-article","created":{"date-parts":[[2016,3,14]],"date-time":"2016-03-14T13:11:18Z","timestamp":1457961078000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Feature Creation based Slicing for Privacy Preserving Data Mining"],"prefix":"10.1145","author":[{"given":"R. Praveena","family":"Priyadarsini","sequence":"first","affiliation":[{"name":"Dept. of Computer Science &amp; Engg Avinashilingam University for Women, Coimbatore, India"}]},{"given":"M. L.","family":"Valarmathi","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science &amp; Engg Government College of Technology, Coimbatore, India"}]},{"given":"S.","family":"Sivakumari","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science &amp; Engg Avinashilingam University for Women, Coimbatore, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497480"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2012.01.001"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Aggarwal C.C. and Philip S.Y. 2008. An introduction to privacy-preserving data mining. In Privacy-preserving data mining. pp. 1--9. Springer US.  Aggarwal C.C. and Philip S.Y. 2008. An introduction to privacy-preserving data mining. In Privacy-preserving data mining. pp. 1--9. Springer US.","DOI":"10.1007\/978-0-387-70992-5_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Aggarwal C.C. and Philip S.Y. 2008. A general survey of privacy-preserving data mining models and algorithms. pp. 11--52. Springer US.  Aggarwal C.C. and Philip S.Y. 2008. A general survey of privacy-preserving data mining models and algorithms. pp. 11--52. Springer US.","DOI":"10.1007\/978-0-387-70992-5_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_7_1","first-page":"139","volume-title":"Proceedings of the 32nd international conference on Very large data bases. (September.2006)","author":"Xiao X.","unstructured":"Xiao , X. and Tao , Y ., 2006. Anatomy: Simple and effective privacy preservation . In Proceedings of the 32nd international conference on Very large data bases. (September.2006) , pp. 139 -- 150 . Xiao, X. and Tao, Y., 2006. Anatomy: Simple and effective privacy preservation. In Proceedings of the 32nd international conference on Very large data bases. (September.2006), pp. 139--150."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142499"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.08.003"},{"volume-title":"Proc. Int'l Conf. On Extending Database Technology.","author":"Aggarwal C. C.","key":"e_1_3_2_1_11_1","unstructured":"Aggarwal C. C. and Yu P. S ., 2004. A Condensation Approach to Privacy Preserving Data Mining , Proc. Int'l Conf. On Extending Database Technology. Aggarwal C. C. and Yu P. S., 2004. A Condensation Approach to Privacy Preserving Data Mining, Proc. Int'l Conf. On Extending Database Technology."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.011"},{"key":"e_1_3_2_1_13_1","first-page":"58","article-title":"Using noise addition method Based an premising to protect health care privacy","volume":"14","author":"Likun Lin","year":"2012","unstructured":"Likun Lin , Kexin Yang, Liang Hue , Lina Li , 2012 . Using noise addition method Based an premising to protect health care privacy . CEAI. 14 , 2, pp 58 -- 64 . Likun Lin, Kexin Yang, Liang Hue, Lina Li, 2012. Using noise addition method Based an premising to protect health care privacy. CEAI. 14, 2, pp 58--64.","journal-title":"CEAI."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.12.005"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.038"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142500"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.236"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2010.11.002"},{"key":"e_1_3_2_1_21_1","first-page":"43","volume-title":"Proceedings of the 2002 IEEE International Conference on Privacy, Security and Data Mining.","author":"Oliveria S.R.M.","unstructured":"Oliveria S.R.M. and Zaiane O.R . 2002. Privacy Preserving Frequent Item Set Mining . In Proceedings of the 2002 IEEE International Conference on Privacy, Security and Data Mining. pp. 43 -- 54 . Oliveria S.R.M. and Zaiane O.R. 2002. Privacy Preserving Frequent Item Set Mining. In Proceedings of the 2002 IEEE International Conference on Privacy, Security and Data Mining. pp. 43--54."},{"key":"e_1_3_2_1_22_1","volume-title":"Introduction to Data Mining. Pearson Education","author":"Tan Pang-Ning","unstructured":"Tan Pang-Ning , Steinbach, M., and Vipin Kumar . 2009. Introduction to Data Mining. Pearson Education , New Delhi . ISBN : 978-81-317-1472-0. 3 rd Edition. Tan Pang-Ning, Steinbach, M., and Vipin Kumar. 2009. Introduction to Data Mining. Pearson Education, New Delhi. ISBN: 978-81-317-1472-0. 3rd Edition.","edition":"3"},{"key":"e_1_3_2_1_23_1","unstructured":"Frank A. and Asuncion A. 2010. UCI Machine Learning Repository Irvine CA: University of California School of Information and Computer http:\/\/archive.ics.uci.edu\/ml  Frank A. and Asuncion A. 2010. UCI Machine Learning Repository Irvine CA: University of California School of Information and Computer http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_24_1","volume-title":"Data Mining: Concepts and Techniques","author":"Jiawei Han","year":"2011","unstructured":"Jiawei Han , Micheline Kamber, and Jian Pei . 2011 . Data Mining: Concepts and Techniques . 3 rd Edition. Morgan Kaufmann . Jiawei Han, Micheline Kamber, and Jian Pei. 2011. Data Mining: Concepts and Techniques. 3rd Edition. Morgan Kaufmann.","edition":"3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/2336664.2336668"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217303"},{"key":"e_1_3_2_1_27_1","first-page":"304","volume-title":"Privacy Preserving Clustering By Data Transformation. Proc. 18th Brazilian Symp. Databases. (Oct.","author":"Oliveira O.R.","year":"2003","unstructured":"S.R.M. Oliveira and O.R. Za\u0131ane , 2003 . Privacy Preserving Clustering By Data Transformation. Proc. 18th Brazilian Symp. Databases. (Oct. 2003 ), pp. 304 -- 318 . S.R.M. Oliveira and O.R. Za\u0131ane, 2003. Privacy Preserving Clustering By Data Transformation. Proc. 18th Brazilian Symp. Databases. (Oct. 2003), pp. 304--318."},{"volume-title":"Entropy Measures, Maximum Entropy and Emerging Applications","author":"Yao Y.","key":"e_1_3_2_1_28_1","unstructured":"Yao , Y. , 2003. Information-Theoretic Measures for Knowledge Discovery and Data Mining . In Karmeshu, ed.: Entropy Measures, Maximum Entropy and Emerging Applications . Springer . Berlin. Pp. 115--136. Yao, Y., 2003. Information-Theoretic Measures for Knowledge Discovery and Data Mining. In Karmeshu, ed.: Entropy Measures, Maximum Entropy and Emerging Applications. Springer. Berlin. Pp. 115--136."},{"volume-title":"RR96-04","author":"Moore Richard A.","key":"e_1_3_2_1_29_1","unstructured":"Moore Richard A. , 1996. Controlled Data-Swapping Techniques for Masking Public Use Microdata Sets. Statistical Research Division Report Series. (1996) , RR96-04 , U.S. Bureau of the Census. Moore Richard A., 1996. Controlled Data-Swapping Techniques for Masking Public Use Microdata Sets. Statistical Research Division Report Series. (1996), RR96-04, U.S. Bureau of the Census."},{"key":"e_1_3_2_1_30_1","first-page":"181","volume-title":"Lin D and Jiang W","author":"Bertino E","year":"2008","unstructured":"Bertino E , Lin D and Jiang W ., 2008 . A Survey of Quantification of Privacy Preserving Data Mining Algorithms. In : Aggarwal CC, Yu PS (eds) Privacy-preserving data mining: models and algorithms. Springer . New York. pp 181 -- 200 . Bertino E, Lin D and Jiang W., 2008. A Survey of Quantification of Privacy Preserving Data Mining Algorithms. In: Aggarwal CC, Yu PS (eds) Privacy-preserving data mining: models and algorithms. Springer. New York. pp 181--200."},{"key":"e_1_3_2_1_31_1","first-page":"128","volume-title":"Computer Security-ESORICS. Springer International Publishing.","author":"Bilogrevic I.","year":"2014","unstructured":"Bilogrevic , I. , Freudiger , J. , De Cristofaro , E. and Uzun , E ., 2014. What's the gist? Privacy-preserving aggregation of user profiles . In Computer Security-ESORICS. Springer International Publishing. ( 2014 ), pp. 128 -- 145 ). Bilogrevic, I., Freudiger, J., De Cristofaro, E. and Uzun, E., 2014. What's the gist? Privacy-preserving aggregation of user profiles. In Computer Security-ESORICS. Springer International Publishing. (2014), pp. 128--145)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.124"},{"key":"e_1_3_2_1_33_1","unstructured":"C. G. K. Liu and H. Kargupta 2008. A survey of attack techniques on privacy-preserving data perurbation methods. in: C. Aggarwal P. Yu (Eds.). Privacy-Preserving Data Mining: Models and Algorithms Springer-Verlag.  C. G. K. Liu and H. Kargupta 2008. A survey of attack techniques on privacy-preserving data perurbation methods. in: C. Aggarwal P. Yu (Eds.). Privacy-Preserving Data Mining: Models and Algorithms Springer-Verlag."},{"key":"e_1_3_2_1_34_1","first-page":"115","volume-title":"Fast Effective Rule Induction. Twelfth International Conference on Machine Learning.","author":"Cohen William W","year":"1995","unstructured":"Cohen William W , 1995 . Fast Effective Rule Induction. Twelfth International Conference on Machine Learning. pp. 115 - 123 . Cohen William W, 1995. Fast Effective Rule Induction. Twelfth International Conference on Machine Learning. pp. 115-123."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"}],"event":{"name":"CODS '16: IKDD Conference on Data Science, 2016","sponsor":["ACM India ACM India"],"location":"Pune India","acronym":"CODS '16"},"container-title":["Proceedings of the 3rd IKDD Conference on Data Science, 2016"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2888451.2888462","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2888451.2888462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:25Z","timestamp":1750273525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2888451.2888462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,13]]},"references-count":35,"alternative-id":["10.1145\/2888451.2888462","10.1145\/2888451"],"URL":"https:\/\/doi.org\/10.1145\/2888451.2888462","relation":{},"subject":[],"published":{"date-parts":[[2016,3,13]]},"assertion":[{"value":"2016-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}