{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T23:07:11Z","timestamp":1687302431949},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819932993","type":"print"},{"value":"9789819933006","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_44","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"609-620","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Privacy Protection Methods for Data Mining"],"prefix":"10.1007","author":[{"given":"Jindong","family":"He","sequence":"first","affiliation":[]},{"given":"Rongyan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Shanshan","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"issue":"1","key":"44_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TKDE.2013.109","volume":"26","author":"X Wu","year":"2014","unstructured":"Wu, X., Zhu, X., Wu, G.-Q., Ding, W.: Data mining with big data. IEEE Trans. Knowl. Data Eng. 26(1), 97\u2013107 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"44_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.26599\/BDMA.2019.9020015","volume":"3","author":"MS Mahmud","year":"2020","unstructured":"Mahmud, M.S., Huang, J.Z., Salloum, S., Emara, T.Z., Sadatdiynov, K.: A survey of data partitioning and sampling methods to support big data analysis. Big Data Min. Analytics 3(2), 85\u2013101 (2020)","journal-title":"Big Data Min. Analytics"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Gan, H.: Research on data mining method based on privacy protection. In: 2020 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), pp. 502\u2013506 (2020)","DOI":"10.1109\/AEMCSE50948.2020.00114"},{"issue":"10","key":"44_CR4","doi-asserted-by":"publisher","first-page":"5765","DOI":"10.1109\/TII.2019.2912175","volume":"15","author":"X Su","year":"2019","unstructured":"Su, X., Fan, K., Shi, W.: Privacy-preserving distributed data fusion based on attribute protection. IEEE Trans. Industr. Inf. 15(10), 5765\u20135777 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"51071","DOI":"10.1109\/ACCESS.2020.2980235","volume":"8","author":"A Zigomitros","year":"2020","unstructured":"Zigomitros, A., Casino, F., Solanas, A., Patsakis, C.: A survey on privacy properties for data publishing of relational data. IEEE Access 8, 51071\u201351099 (2020)","journal-title":"IEEE Access"},{"key":"44_CR6","doi-asserted-by":"publisher","first-page":"20067","DOI":"10.1109\/ACCESS.2019.2962368","volume":"8","author":"M Binjubeir","year":"2020","unstructured":"Binjubeir, M., Ahmed, A.A., Ismail, M.A.B., Sadiq, A.S., Khan, M.K.: Comprehensive survey on big data privacy protection. IEEE Access 8, 20067\u201320079 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"44_CR7","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TKDE.2019.2929794","volume":"33","author":"GD Samaraweera","year":"2021","unstructured":"Samaraweera, G.D., Chang, J.M.: Security and privacy implications on database systems in big data era: a survey. IEEE Trans. Knowl. Data Eng. 33(1), 239\u2013258 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Wang, X., Luo, W., Bai, X., Wang, Y. Research on big data security and privacy risk governance. In: 2021 International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR), pp. 15\u201318 (2021)","DOI":"10.1109\/ICBAR55169.2021.00011"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Lv, C. The Dilemma and Countermeasures of Personal Privacy Protection in the Era of Big Data. 2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI), pp. 335\u2013338 (2022)","DOI":"10.1109\/IWECAI55315.2022.00071"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Venkatachalam, K., Reddy, V.P., Amudhan, M., Raguraman, A., Mohan, E.: an implementation of k-means clustering for efficient image segmentation. In: 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 224\u2013229 (2021)","DOI":"10.1109\/CSNT51715.2021.9509680"},{"issue":"4","key":"44_CR11","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.1109\/TII.2017.2695487","volume":"13","author":"K Xing","year":"2017","unstructured":"Xing, K., Hu, C., Yu, J., Cheng, X., Zhang, F.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Industr. Inf. 13(4), 2066\u20132076 (2017)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"4","key":"44_CR12","first-page":"1541","volume":"18","author":"Z Lu","year":"2021","unstructured":"Lu, Z., Shen, H.: Differentially private k-means clustering with convergence guarantee. IEEE Trans. Dependable Secure Comput. 18(4), 1541\u20131552 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Lv, Z., Wei, L., Chen, Y., Liu, Y., Li, C., Peng, D.: Differential privacy algorithm for integrated energy system based on improved k-means. In: 2021 6th International Conference on Power and Renewable Energy (ICPRE), pp. 1359\u20131363 (2021)","DOI":"10.1109\/ICPRE52634.2021.9635361"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Mohan, L., Pant, J., Suyal, P., Kumar, A.: Support vector machine accuracy improvement with classification. In: 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 477\u2013481 (2020)","DOI":"10.1109\/CICN49253.2020.9242572"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Sun, X., Zhang, Z., Huang, W. Privacy-preserving SVM classification algorithm based on negative database. In: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 1402\u20131407 (2022)","DOI":"10.1109\/CSCWD54268.2022.9776154"},{"issue":"1","key":"44_CR16","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/JIOT.2020.3004231","volume":"8","author":"J Wang","year":"2021","unstructured":"Wang, J., Wu, L., Wang, H., Choo, K.-K.R., He, D.: An efficient and privacy-preserving outsourced support vector machine training for internet of medical things. IEEE Internet Things J. 8(1), 458\u2013473 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"44_CR17","doi-asserted-by":"publisher","first-page":"3342","DOI":"10.1109\/JBHI.2022.3157592","volume":"26","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Mao, Q., Wang, B., Duan, P., Zhang, B., Hong, Z.: Privacy-preserving multi-class support vector machine model on medical diagnosis. IEEE J. Biomed. Health Inform. 26(7), 3342\u20133353 (2022)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Yang, F.-J.: An extended idea about decision trees. In: 2019 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 349\u2013354 (2019)","DOI":"10.1109\/CSCI49370.2019.00068"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Ding, S., Cao, Z., Dong, X.: Efficient privacy preserving decision tree inference service. In: 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications( AEECA), pp. 512\u2013516 (2020)","DOI":"10.1109\/AEECA49918.2020.9213553"},{"issue":"4","key":"44_CR20","doi-asserted-by":"publisher","first-page":"1632","DOI":"10.1109\/TDSC.2019.2922958","volume":"18","author":"J Liang","year":"2021","unstructured":"Liang, J., Qin, Z., Xiao, S., Ou, L., Lin, X.: Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Trans. Dependable Secure Comput. 18(4), 1632\u20131644 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"44_CR21","doi-asserted-by":"publisher","first-page":"45032","DOI":"10.1109\/ACCESS.2019.2908452","volume":"7","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Wang, W., Zhang, Y.: Privacy preserving association rule mining: taxonomy, techniques, and metrics. IEEE Access 7, 45032\u201345047 (2019)","journal-title":"IEEE Access"},{"issue":"7","key":"44_CR22","first-page":"3241","volume":"34","author":"Z Shi","year":"2022","unstructured":"Shi, Z., Fu, X., Li, X., Zhu, K.: ESVSSE: enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans. Knowl. Data Eng. 34(7), 3241\u20133254 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"44_CR23","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1109\/TCC.2019.2932065","volume":"10","author":"J Wu","year":"2022","unstructured":"Wu, J., Mu, N., Lei, X., Le, J., Zhang, D., Liao, X.: SecEDMO: enabling efficient data mining with strong privacy protection in cloud computing. IEEE Trans. Cloud Comput. 10(1), 691\u2013705 (2022)","journal-title":"IEEE Trans. Cloud Comput."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:12:28Z","timestamp":1685459548000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}