{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:06:18Z","timestamp":1725545178238},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540327806"},{"type":"electronic","value":"9783540327813"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11681960_25","type":"book-chapter","created":{"date-parts":[[2006,2,22]],"date-time":"2006-02-22T02:19:04Z","timestamp":1140574744000},"page":"251-261","source":"Crossref","is-referenced-by-count":2,"title":["New Approach to the Re-identification Problem Using Neural Networks"],"prefix":"10.1007","author":[{"given":"Jordi","family":"Nin","sequence":"first","affiliation":[]},{"given":"Vicen\u00e7","family":"Torra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy Preserving Data Mining. In: Proc. of the ACM SIGMOD Conference on Management of Data, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"25_CR2","unstructured":"Data Extraction System, U.S. Census Bureau, http:\/\/www.census.gov\/DES\/www\/welcome.html"},{"key":"25_CR3","series-title":"Algorithms Applications and Programming Techniques","volume-title":"Neural Networks","author":"J.A. Freeman","year":"1991","unstructured":"Freeman, J.A., Skapura, D.M.: Neural Networks. Algorithms Applications and Programming Techniques. Addison-Wesley, Reading (1991)"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/S0169-023X(99)00044-0","volume":"33","author":"W. Li","year":"2000","unstructured":"Li, W., Clifton, C.: SEMINT: A tool for identifying correspondences in heterogeneus databases using neural networks. Data & Knowledge Engineering\u00a033, 49\u201384 (2000)","journal-title":"Data & Knowledge Engineering"},{"issue":"1","key":"25_CR5","first-page":"39","volume":"40","author":"Y. Narukawa","year":"2004","unstructured":"Narukawa, Y., Torra, V.: Twofold integral and Multi-step Choquet integral. Kybernetika\u00a040(1), 39\u201350 (2004)","journal-title":"Kybernetika"},{"issue":"4","key":"25_CR6","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1142\/S0218488505003540","volume":"13","author":"Y. Narukawa","year":"2005","unstructured":"Narukawa, Y., Torra, V.: Graphical interpretation of the twofold integral and its generalization. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a013(4), 415\u2013424 (2005)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Nguyen, D., Widrow, B.: Improving the learning speed of 2-layer neural networks by choosing initial values of the adaptive weights. In: Proc. of the Int\u2019l. Joint Conference on Neural Networks, vol.\u00a03, pp. 21\u201326 (1990)","DOI":"10.1109\/IJCNN.1990.137819"},{"key":"25_CR8","unstructured":"Nin, J., Torra, V.: Towards the use of OWA operators for record linkage. In: Proc. of the European Soc. on Fuzzy Logic and Technologies (in press, 2005)"},{"key":"25_CR9","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11596448_1","volume-title":"Computational Intelligence and Security","author":"J. Nin","year":"2005","unstructured":"Nin, J., Torra, V.: Empirical analysis of database privacy using twofold integrals. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol.\u00a03801, pp. 1\u20138. Springer, Heidelberg (2005)"},{"key":"25_CR10","volume-title":"Neural Networks - A Systematic Introduction","author":"R. Rojas","year":"1996","unstructured":"Rojas, R.: Neural Networks - A Systematic Introduction. Springer, Heidelberg (1996)"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-36519-8_7","volume-title":"Information Fusion in Data Mining","author":"V. Torra","year":"2003","unstructured":"Torra, V., Domingo-Ferrer, J.: Record linkage methods for multidatabase data mining. In: Torra, V. (ed.) Information Fusion in Data Mining, pp. 101\u2013132. Springer, Heidelberg (2003)"},{"key":"25_CR12","first-page":"326","volume-title":"Proc. of the 14th European Conference on Artificial Intelligence (ECAI 2000)","author":"V. Torra","year":"2000","unstructured":"Torra, V.: Towards the re-identification of individuals in data files with non-common variables. In: Proc. of the 14th European Conference on Artificial Intelligence (ECAI 2000), Berlin, Germany, pp. 326\u2013330. IOS Press, Amsterdam (2000)"},{"issue":"5","key":"25_CR13","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/TFUZZ.2004.834814","volume":"12","author":"V. Torra","year":"2004","unstructured":"Torra, V.: OWA operators in data modeling and re-identification. IEEE Trans. on Fuzzy Systems\u00a012(5), 652\u2013660 (2004)","journal-title":"IEEE Trans. on Fuzzy Systems"},{"key":"25_CR14","unstructured":"Murphy, P.M., Aha, D.W.: UCI Repository machine learning databases. University of California, Department of Information and Computer Science, Irvine, CA (1994), http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"25_CR15","series-title":"Lecture Notes in Statistics","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control","author":"L. Willenborg","year":"2001","unstructured":"Willenborg, L., de Waal, T.: Elements of Statistical Disclosure Control. Lecture Notes in Statistics. Springer, Heidelberg (2001)"},{"key":"25_CR16","unstructured":"Winkler, W.E.: Data Cleaning Methods. In: Proc. SIGKDD 2003, Washington (2003)"},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-25955-8_17","volume-title":"Privacy in Statistical Databases","author":"W.E. Winkler","year":"2004","unstructured":"Winkler, W.E.: Re-identification methods for masked microdata. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol.\u00a03050, pp. 216\u2013230. Springer, Heidelberg (2004)"},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/21.87068","volume":"18","author":"R.R. Yager","year":"1988","unstructured":"Yager, R.R.: On ordered weighted averaging aggregation operators in multi-criteria decision making. IEEE Trans. Syst., Man, Cybern.\u00a018, 183\u2013190 (1988)","journal-title":"IEEE Trans. Syst., Man, Cybern."}],"container-title":["Lecture Notes in Computer Science","Modeling Decisions for Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11681960_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T21:35:48Z","timestamp":1555450548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11681960_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540327806","9783540327813"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11681960_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}