{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:54:42Z","timestamp":1776394482450,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316632","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"65-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["A Survey on Privacy Preserving Data Mining Approaches and Techniques"],"prefix":"10.1145","author":[{"given":"Maheyzah Md","family":"Siraj","sequence":"first","affiliation":[{"name":"School of Computing, Universiti Teknologi Malaysia, Johor, Malaysia"}]},{"given":"Nurul Adibah","family":"Rahmat","sequence":"additional","affiliation":[{"name":"School of Computing, Universiti Teknologi Malaysia, Johor, Malaysia"}]},{"given":"Mazura Mat","family":"Din","sequence":"additional","affiliation":[{"name":"School of Computing, Universiti Teknologi Malaysia, Johor, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2321","article-title":"A Review on Privacy Preserving Data Mining","volume":"3","author":"Patel Shrada","year":"2016","journal-title":"IJSDR (International Journal for Scientific Research & Developmental)"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2012.15"},{"key":"e_1_3_2_1_3_1","first-page":"5","article-title":"An Extensive Survey of Privacy Preserving Data Mining Techniques","volume":"6","author":"Sundararajan Bhargav","year":"2017","journal-title":"IJCSN International Journal of Computer Science and Network, V olume"},{"issue":"4","key":"e_1_3_2_1_4_1","article-title":"A Brief Survey on Privacy Techniques in Data Mining","volume":"18","author":"Vinoth Kumar","year":"2016","journal-title":"IOSRH Journal of Computer Engineering (IOSR-JCE)"},{"key":"e_1_3_2_1_5_1","volume-title":"Discrimination and Privacy in the Information Society: 209--221","author":"Data Mining Techniques Privacy Preserving","year":"2013"},{"key":"e_1_3_2_1_6_1","first-page":"2079","article-title":"An Approach for Privacy Preserving and Knowledge In Data Mining Application","volume":"4","author":"Hamami Alaa H","year":"2013","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502546"},{"key":"e_1_3_2_1_9_1","unstructured":"Tom Krenzke Katie Hubbell Mamadou Diallo Amita Gopinath and Sixia Chen \"Data Coarsening and Data Swapping Algorithms\" 2014.  Tom Krenzke Katie Hubbell Mamadou Diallo Amita Gopinath and Sixia Chen \"Data Coarsening and Data Swapping Algorithms\" 2014."},{"issue":"3","key":"e_1_3_2_1_10_1","first-page":"2127","article-title":"Survey of Various Techniques to Provide Multilevel Trust in Privacy Preserving Data Mining","volume":"3","author":"Mynavathi","year":"2014","journal-title":"International Journal of Engineering Science and Technology"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2012.15"},{"key":"e_1_3_2_1_12_1","unstructured":"Bhanumathi S. And Sakthivel \"A New Model for Privacy Preserving Multiparty Collaborative Data Mining\".  Bhanumathi S. And Sakthivel \"A New Model for Privacy Preserving Multiparty Collaborative Data Mining\"."},{"key":"e_1_3_2_1_13_1","volume-title":"Conferences on Circuits Power and Computing Technologies (ICCPCT-2013)","author":"International","year":"2013"},{"key":"e_1_3_2_1_14_1","unstructured":"Ryan Stephens and Ron Plew \"The Database Normalization Process\" Sans Teach Yourself SQL in 24 Hours 3rd Edition 2002.  Ryan Stephens and Ron Plew \"The Database Normalization Process\" Sans Teach Yourself SQL in 24 Hours 3rd Edition 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2012.15"},{"issue":"3","key":"e_1_3_2_1_16_1","first-page":"2127","article-title":"A Survey on Privacy Preserving Data Mining: Approaches and Techniques","volume":"3","author":"And Devi Nayan G.","year":"2011","journal-title":"International Journal of Engineering Science and Technology"},{"issue":"3","key":"e_1_3_2_1_17_1","first-page":"217","article-title":"Survey of Various Techniques to Provide Multilevel Trust in Privacy Preserving Data Mining","volume":"3","author":"Mynavathi R., Sowmiya","year":"2014","journal-title":"International Journnal of Engineering Science and Technology"},{"issue":"4","key":"e_1_3_2_1_18_1","article-title":"A Brief Survey on Privacy Techniques in Data Mining","volume":"18","author":"Vinoth Kumar","year":"2016","journal-title":"IOSRH Journal of Computer Engineering (IOSR-JCE)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980258.2980345"}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","location":"Penang Malaysia","acronym":"ICSCA '19","sponsor":["University of New Brunswick University of New Brunswick"]},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316632","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:11Z","timestamp":1750208531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":19,"alternative-id":["10.1145\/3316615.3316632","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316632","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}