{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:24:19Z","timestamp":1747459459793},"publisher-location":"Boston, MA","reference-count":0,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387709918"},{"type":"electronic","value":"9780387709925"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-0-387-70992-5_15","type":"book-chapter","created":{"date-parts":[[2008,6,9]],"date-time":"2008-06-09T04:04:54Z","timestamp":1212984294000},"page":"359-381","source":"Crossref","is-referenced-by-count":39,"title":["A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods"],"prefix":"10.1007","author":[{"given":"Kun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chris","family":"Giannella","sequence":"additional","affiliation":[]},{"given":"Hillol","family":"Kargupta","sequence":"additional","affiliation":[]}],"member":"297","container-title":["Advances in Database Systems","Privacy-Preserving Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-70992-5_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:20:27Z","timestamp":1619670027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-70992-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9780387709918","9780387709925"],"references-count":0,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-70992-5_15","relation":{},"ISSN":["1386-2944"],"issn-type":[{"type":"print","value":"1386-2944"}],"subject":[],"published":{"date-parts":[[2008]]}}}