{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:41Z","timestamp":1750306181024,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970302","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"75-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation"],"prefix":"10.1145","author":[{"given":"Fumin","family":"Qi","sequence":"first","affiliation":[{"name":"Wuhan University, China"}]},{"given":"Xiao-Yuan","family":"Jing","sequence":"additional","affiliation":[{"name":"Wuhan University, China \/ Nanjing University of Posts and Telecommunications, China"}]},{"given":"Xiaoke","family":"Zhu","sequence":"additional","affiliation":[{"name":"Wuhan University, China \/ Henan University, China"}]},{"given":"Fei","family":"Wu","sequence":"additional","affiliation":[{"name":"Wuhan University, China \/ Nanjing University of Posts and Telecommunications, China"}]},{"given":"Li","family":"Cheng","sequence":"additional","affiliation":[{"name":"Wuhan University, China"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032649.1033461"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.07.035"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"IEEE International Conference on Fuzzy Systems (FUZZ)","author":"Honda K.","year":"2012","unstructured":"K. Honda , A. Kawano , A. Notsu , A fuzzy variant of kmember clustering for collaborative filtering with data anonymization . In IEEE International Conference on Fuzzy Systems (FUZZ) , pages 1 - 6 , 2012 . K. Honda, A. Kawano, A. Notsu, et al. A fuzzy variant of kmember clustering for collaborative filtering with data anonymization. In IEEE International Conference on Fuzzy Systems (FUZZ), pages 1-6, 2012."},{"key":"e_1_3_2_1_10_1","volume-title":"Efficient kanonymization using clustering techniques","author":"Byun J. W.","year":"2007","unstructured":"J. W. Byun , A. Kamra , E. Bertino , Efficient kanonymization using clustering techniques . Springer Berlin Heidelberg , 2007 J. W. Byun, A. Kamra, E. Bertino, et al. Efficient kanonymization using clustering techniques. Springer Berlin Heidelberg, 2007"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"IEEE International Conference on Fuzzy Systems (FUZZ)","author":"Kasugai H.","year":"2013","unstructured":"H. Kasugai , A. Kawano , K. Honda , A study on applicability of fuzzy k-member clustering to privacypreserving pattern recognition . In IEEE International Conference on Fuzzy Systems (FUZZ) , pages 1 - 6 , 2013 . H. Kasugai, A. Kawano, K. Honda, et al. A study on applicability of fuzzy k-member clustering to privacypreserving pattern recognition. In IEEE International Conference on Fuzzy Systems (FUZZ), pages 1-6, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-014-0774-7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1798596.1798602"},{"key":"e_1_3_2_1_15_1","first-page":"139","volume-title":"International Conference on Very Large Data Bases (VLDB)","author":"Xiao X.","year":"2006","unstructured":"X. Xiao , Y. Tao . Anatomy : Simple and effective privacy preservation . International Conference on Very Large Data Bases (VLDB) , pages 139 - 150 , 2006 . X. Xiao, Y. Tao. Anatomy: Simple and effective privacy preservation. International Conference on Very Large Data Bases (VLDB), pages 139-150, 2006."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.13"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.236"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337246"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.6"},{"key":"e_1_3_2_1_23_1","first-page":"801","volume-title":"ACM International Conference on Software Engineering (ICSE)","author":"Peters F.","year":"2015","unstructured":"F. Peters , T. Menzies , L. Layman . LACE2 : better privacypreserving data sharing for cross project defect Prediction . In ACM International Conference on Software Engineering (ICSE) , pages 801 - 811 , 2015 . F. Peters, T. Menzies, L. Layman. LACE2: better privacypreserving data sharing for cross project defect Prediction. In ACM International Conference on Software Engineering (ICSE), pages 801-811, 2015."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985797"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025143"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351718"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993551"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_31_1","volume-title":"Principal component analysis","author":"Jolliffe I.","year":"2002","unstructured":"I. Jolliffe . Principal component analysis . John Wiley & amp; Sons, 2002 . I. Jolliffe. Principal component analysis. John Wiley &amp; Sons, 2002."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00021-3"},{"issue":"39","key":"e_1_3_2_1_33_1","first-page":"1","article-title":"Maximum likelihood from incomplete data via the EM algorithm","volume":"1","author":"Dempster A. P.","year":"1977","unstructured":"A. P. Dempster , N. M. Laird , D. B. Rubin . Maximum likelihood from incomplete data via the EM algorithm . Journal of the Royal Statistical Society , 1 ( 39 ): 1 - 38 , 1977 . A. P. Dempster, N. M. Laird, D. B. Rubin. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, 1(39):1-38, 1977.","journal-title":"Journal of the Royal Statistical Society"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.111"},{"key":"e_1_3_2_1_35_1","volume-title":"PROMISE Repository of empirical software engineering data","author":"Boetticher G.","year":"2007","unstructured":"G. Boetticher , T. Menzies , T. Ostrand . PROMISE Repository of empirical software engineering data . West Virginia University , Department of Computer Science, 2007 . G. Boetticher, T. Menzies, T. Ostrand. PROMISE Repository of empirical software engineering data. West Virginia University, Department of Computer Science, 2007."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/22899.22906"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.277575"},{"key":"e_1_3_2_1_38_1","volume-title":"Differential privacy: A survey of results","author":"Dwork C.","year":"2008","unstructured":"C. Dwork . Differential privacy: A survey of results . Springer Berlin Heidelberg , 2008 . C. Dwork. Differential privacy: A survey of results. Springer Berlin Heidelberg, 2008."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.5"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.190"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376666"},{"key":"e_1_3_2_1_42_1","volume-title":"Cancer statistics","author":"Parker S. L.","year":"1996","unstructured":"S. L. Parker , T. Tong , S. Bolden , Cancer statistics , 1996 . CA : A cancer journal for clinicians, 46(1): 5-27, 1996. S. L. Parker, T. Tong, S. Bolden, et al. Cancer statistics, 1996. CA: A cancer journal for clinicians, 46(1): 5-27, 1996."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2319"},{"key":"e_1_3_2_1_44_1","first-page":"585","article-title":"Laplacian eigenmaps and spectral techniques for embedding and clustering","volume":"14","author":"Belkin M.","year":"2001","unstructured":"M. Belkin , P. Niyogi . Laplacian eigenmaps and spectral techniques for embedding and clustering , Advance in Neural Information Processing System. 14 : 585 - 591 , 2001 . M. Belkin, P. Niyogi. Laplacian eigenmaps and spectral techniques for embedding and clustering, Advance in Neural Information Processing System. 14: 585-591, 2001.","journal-title":"Advance in Neural Information Processing System."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2015.2441634"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4517923"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.02.005"},{"key":"e_1_3_2_1_48_1","volume-title":"Locality preserving projections","author":"Niyogi X.","year":"2004","unstructured":"X. Niyogi . Locality preserving projections . MIT Press , 2004 . X. Niyogi. Locality preserving projections. MIT Press, 2004."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135810"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.27"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.55"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2339850"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062559"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884827"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-012-0108-5"},{"key":"e_1_3_2_1_57_1","volume-title":"Euclidean distance mapping. Computer Graphics and image processing, 14(3): 227-248","author":"Danielsson P. E.","year":"1980","unstructured":"P. E. Danielsson . Euclidean distance mapping. Computer Graphics and image processing, 14(3): 227-248 , 1980 . P. E. Danielsson. Euclidean distance mapping. Computer Graphics and image processing, 14(3): 227-248, 1980."},{"key":"e_1_3_2_1_58_1","first-page":"1","article-title":"Improved heterogeneous distance functions","author":"Wilson D. R.","year":"1997","unstructured":"D. R. Wilson , T. R. Martinez . Improved heterogeneous distance functions . Journal of Artificial Intelligence Research, (6) : 1 - 34 , 1997 . D. R. Wilson, T. R. Martinez. Improved heterogeneous distance functions. Journal of Artificial Intelligence Research, (6): 1-34, 1997.","journal-title":"Journal of Artificial Intelligence Research, (6)"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884839"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100072"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/557000"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/1839514.1839518"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.83"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.235271"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00128-3"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884830"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Singapore Singapore","acronym":"ASE'16"},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970302","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":65,"alternative-id":["10.1145\/2970276.2970302","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970302","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}