{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T17:03:37Z","timestamp":1771261417602,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T00:00:00Z","timestamp":1521590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Qatar Foundation","award":["NPRP-X-063-1-014"],"award-info":[{"award-number":["NPRP-X-063-1-014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,21]]},"DOI":"10.1145\/3180445.3180452","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"43-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Differentially Private Feature Selection for Data Mining"],"prefix":"10.1145","author":[{"given":"Balamurugan","family":"Anandan","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Chris","family":"Clifton","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"8th Intl Workshop on Expert Systems and their Applications. 59--78","author":"Bohanec Marko","year":"1988","unstructured":"Marko Bohanec and Vladislav Rajkovic . 1988 . Knowledge acquisition and explanation for multi-attribute decision making . In 8th Intl Workshop on Expert Systems and their Applications. 59--78 . Marko Bohanec and Vladislav Rajkovic. 1988. Knowledge acquisition and explanation for multi-attribute decision making. In 8th Intl Workshop on Expert Systems and their Applications. 59--78."},{"key":"e_1_3_2_1_2_1","volume-title":"Classification and regression trees","author":"Breiman Leo","unstructured":"Leo Breiman , Jerome Friedman , Charles J Stone , and Richard A Olshen . 1984. Classification and regression trees . CRC press . Leo Breiman, Jerome Friedman, Charles J Stone, and Richard A Olshen. 1984. Classification and regression trees. CRC press."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020598"},{"key":"e_1_3_2_1_4_1","volume-title":"Theory and applications of models of computation","author":"Dwork Cynthia","unstructured":"Cynthia Dwork . 2008. Differential privacy: A survey of results . In Theory and applications of models of computation . Springer , 1--19. Cynthia Dwork. 2008. Differential privacy: A survey of results. In Theory and applications of models of computation. Springer, 1--19."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536467"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.140"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835868"},{"key":"e_1_3_2_1_9_1","volume-title":"Research & Advanced Technology for Digital Libraries","author":"Galavotti Luigi","unstructured":"Luigi Galavotti , Fabrizio Sebastiani , and Maria Simi . 2000. Experiments on the use of feature selection and negative evidence in automated text categorization . In Research & Advanced Technology for Digital Libraries . Springer . Luigi Galavotti, Fabrizio Sebastiani, and Maria Simi. 2000. Experiments on the use of feature selection and negative evidence in automated text categorization. In Research & Advanced Technology for Digital Libraries. Springer."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25159-2_57"},{"key":"e_1_3_2_1_11_1","volume-title":"Zachary Chase Lipton, and Charles Elkan","author":"Ji Zhanglong","year":"2014","unstructured":"Zhanglong Ji , Zachary Chase Lipton, and Charles Elkan . 2014 . Differential Privacy and Machine Learning: a Survey and Review. CoRR abs\/1412.7584 (2014).arXiv:1412.7584 http:\/\/arxiv.org\/abs\/1412.7584 Zhanglong Ji, Zachary Chase Lipton, and Charles Elkan. 2014. Differential Privacy and Machine Learning: a Survey and Review. CoRR abs\/1412.7584 (2014).arXiv:1412.7584 http:\/\/arxiv.org\/abs\/1412.7584"},{"key":"e_1_3_2_1_12_1","unstructured":"M. Lichman. 2013. UCI Machine Learning Repository. (2013). http:\/\/archive.ics.uci.edu\/ml  M. Lichman. 2013. UCI Machine Learning Repository. (2013). http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020487"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.76"},{"key":"e_1_3_2_1_16_1","volume-title":"Tight Lower Bounds for Differentially Private Selection. CoRR abs\/1704.03024","author":"Steinke Thomas","year":"2017","unstructured":"Thomas Steinke and Jonathan Ullman . 2017. Tight Lower Bounds for Differentially Private Selection. CoRR abs\/1704.03024 ( 2017 ). arXiv:1704.03024 http:\/\/arxiv.org\/abs\/1704.03024 Thomas Steinke and Jonathan Ullman. 2017. Tight Lower Bounds for Differentially Private Selection. CoRR abs\/1704.03024 (2017). arXiv:1704.03024 http:\/\/arxiv.org\/abs\/1704.03024"},{"key":"e_1_3_2_1_17_1","volume-title":"Differentially private algorithms for empirical machine learning. arXiv preprint arXiv:1411.5428","author":"Stoddard Ben","year":"2014","unstructured":"Ben Stoddard , Yan Chen , and Ashwin Machanavajjhala . 2014. Differentially private algorithms for empirical machine learning. arXiv preprint arXiv:1411.5428 ( 2014 ). Ben Stoddard, Yan Chen, and Ashwin Machanavajjhala. 2014. Differentially private algorithms for empirical machine learning. arXiv preprint arXiv:1411.5428 (2014)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.80"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33486-3_2"},{"key":"e_1_3_2_1_20_1","volume-title":"Privacy Preserving IR Workshop (PIR2016)","author":"Yang Grace Hui","year":"2015","unstructured":"Grace Hui Yang and Ian Soboroff ( Eds .). 2015 . Privacy Preserving IR Workshop (PIR2016) . SIGIR, Santiago, Chile. http:\/\/cs-sys-1.uis.georgetown.edu\/~hw271\/pirNetwork\/index.html Grace Hui Yang and Ian Soboroff (Eds.). 2015. Privacy Preserving IR Workshop (PIR2016). SIGIR, Santiago, Chile. http:\/\/cs-sys-1.uis.georgetown.edu\/~hw271\/pirNetwork\/index.html"},{"key":"e_1_3_2_1_21_1","volume-title":"2014 International Joint Conference on Neural Networks (IJCNN). 4182--4189","author":"Yang J.","unstructured":"J. Yang and Y. Li . 2014. Differentially private feature selection . In 2014 International Joint Conference on Neural Networks (IJCNN). 4182--4189 . J. Yang and Y. Li. 2014. Differentially private feature selection. In 2014 International Joint Conference on Neural Networks (IJCNN). 4182--4189."},{"key":"e_1_3_2_1_22_1","volume-title":"ICML","volume":"97","author":"Yang Yiming","year":"1997","unstructured":"Yiming Yang and Jan O Pedersen . 1997 . A comparative study on feature selection in text categorization . In ICML , Vol. 97 . 412--420. Yiming Yang and Jan O Pedersen. 1997. A comparative study on feature selection in text categorization. In ICML, Vol. 97. 412--420."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA","acronym":"CODASPY '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180445.3180452","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180445.3180452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:52Z","timestamp":1750213612000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180445.3180452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,21]]},"references-count":22,"alternative-id":["10.1145\/3180445.3180452","10.1145\/3180445"],"URL":"https:\/\/doi.org\/10.1145\/3180445.3180452","relation":{},"subject":[],"published":{"date-parts":[[2018,3,21]]},"assertion":[{"value":"2018-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}