{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:22:18Z","timestamp":1759335738983,"version":"3.37.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000622"},{"type":"electronic","value":"9783030000639"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00063-9_13","type":"book-chapter","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T05:39:46Z","timestamp":1535607586000},"page":"118-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards Personal Data Identification and Anonymization Using Machine Learning Techniques"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Di Cerbo","sequence":"first","affiliation":[]},{"given":"Slim","family":"Trabelsi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,31]]},"reference":[{"key":"13_CR1","unstructured":"Spacy, industrial-strength natural language processing. \nhttps:\/\/spacy.io\n\n. Accessed 12 May 2018"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Bilenko, M., Basil, S., Sahami, M.: Adaptive product normalization: using online learning for record linkage in comparison shopping. In: Fifth IEEE International Conference on Data Mining, p. 8. IEEE (2005)","DOI":"10.1109\/ICDM.2005.18"},{"key":"13_CR3","unstructured":"European Parliament and Council: Regulation (EU) 2016\/679 of the European Parliament and of the Council - On the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (2016). \nhttp:\/\/goo.gl\/LfwxGe\n\n. Accessed 27 Apr 2016"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by GIBBS sampling. In: Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics, Association for Computational Linguistics, pp. 363\u2013370 (2005)","DOI":"10.3115\/1219840.1219885"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"McCallum, A., Li, W.: Early results for named entity recognition with conditional random fields, feature induction and web-enhanced lexicons. In: Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL 2003-vol. 4, Association for Computational Linguistics, pp. 188\u2013191 (2003)","DOI":"10.3115\/1119176.1119206"},{"key":"13_CR6","first-page":"1701","volume":"57","author":"P Ohm","year":"2009","unstructured":"Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. Ucla. L. Rev. 57, 1701 (2009)","journal-title":"Ucla. L. Rev."},{"key":"13_CR7","unstructured":"Peneti, S., Rani, B.P.: Confidential data identification using data mining techniques in data leakage prevention system. Int. J. Data Min. Knowl. Manage. Process. 5(5), 65\u201373 (2015)"},{"issue":"4","key":"13_CR8","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1561\/2200000013","volume":"4","author":"C Sutton","year":"2012","unstructured":"Sutton, C., McCallum, A.: An introduction to conditional random fields. Found. Trends\u00ae Mach. Learn. 4(4), 267\u2013373 (2012)","journal-title":"Found. Trends\u00ae Mach. Learn."},{"key":"13_CR9","unstructured":"Winkler, W.E.: Methods for record linkage and bayesian networks. Technical report, Statistical Research Division, US Census Bureau, Washington, DC (2002)"}],"container-title":["Communications in Computer and Information Science","New Trends in Databases and Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00063-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T05:47:02Z","timestamp":1535608022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00063-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000622","9783030000639"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00063-9_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}