{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:49:28Z","timestamp":1729619368601,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/incos.2012.71","type":"proceedings-article","created":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T17:46:50Z","timestamp":1351273610000},"page":"311-317","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data"],"prefix":"10.1109","author":[{"given":"Xiaoyan","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Momeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Min","family":"Xie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/SFCS.1986.25"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/956750.956776"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/MSP.2004.108"},{"key":"13","first-page":"35","article-title":"Affinity propagation: A clustering algorithm for computer-assisted business simulations and experiental exercises","author":"thavikulwat","year":"2008","journal-title":"Developments in Business Simulation and Experiential Learning"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/775047.775142"},{"key":"11","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","article-title":"Privacy preserving data mining","volume":"99","author":"lindell","year":"2000","journal-title":"Advances in Cryptology (CRYPTO 2000)"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/3-540-48910-X_16"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/508171.508174"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/772862.772867"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/342009.335438"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/1081870.1081942"},{"year":"1998","author":"goldreich","journal-title":"Secure Multi-Party Computation","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1162\/neco.2009.05-08-785"},{"key":"5","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1126\/science.1136800","article-title":"Clustering by passing messages between data points","volume":"315","author":"frey","year":"2007","journal-title":"Science"},{"year":"2009","author":"dueck","journal-title":"Affinity Propagation Clustering Data by Passing Messages","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1137\/1.9781611972764.47"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/28395.28420"}],"event":{"name":"2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS)","start":{"date-parts":[[2012,9,19]]},"location":"Bucharest, Romania","end":{"date-parts":[[2012,9,21]]}},"container-title":["2012 Fourth International Conference on Intelligent Networking and Collaborative Systems"],"original-title":[],"link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/6336635\/6337894\/06337936.pdf?arnumber=6337936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:56:48Z","timestamp":1497995808000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6337936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":17,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1109\/incos.2012.71","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}