{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:31:33Z","timestamp":1743129093671,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319997704"},{"type":"electronic","value":"9783319997711"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99771-1_11","type":"book-chapter","created":{"date-parts":[[2018,8,24]],"date-time":"2018-08-24T16:58:04Z","timestamp":1535129884000},"page":"160-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Application of Genetic Algorithms to\u00a0Data Synthesis: A Comparison of\u00a0Three Crossover Methods"],"prefix":"10.1007","author":[{"given":"Yingrui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Mark","family":"Elliot","sequence":"additional","affiliation":[]},{"given":"Duncan","family":"Smith","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,25]]},"reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-540-25955-8_22","volume-title":"Privacy in Statistical Databases","author":"JM Abowd","year":"2004","unstructured":"Abowd, J.M., Lane, J.: New approaches to confidentiality protection: synthetic data, remote access and research data centers. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 282\u2013289. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25955-8_22"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0045-7825(99)00385-0","volume":"186","author":"E Cantu-Paz","year":"2000","unstructured":"Cantu-Paz, E., Goldberg, D.: Efficient parallel genetic algorithms: theory and practice. Comput. Methods Appl. Mech. Eng. 186, 221\u2013238 (2000)","journal-title":"Comput. Methods Appl. Mech. Eng."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Y., Elliot, M., Sakshaug, J.: A genetic algorithm approach to synthetic data production. In: Proceedings of the 1st International Workshop on AI for Privacy and Security (2016). Article no. 13","DOI":"10.1145\/2970030.2970034"},{"key":"11_CR4","unstructured":"Chen, Y., Elliot, M., Sakshaug, J.: Genetic algorithms in matrix representation and its application in synthetic data, UNECE work session on statistical data confidentiality (2017). https:\/\/www.unece.org\/fileadmin\/DAM\/stats\/documents\/ece\/ces\/ge.46\/2017\/2_Genetic_algorithms.pdf. Accessed 20 Dec 2017"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-0-387-27696-0_9","volume-title":"Secure Data Management in Decentralized Systems","author":"V Ciriani","year":"2007","unstructured":"Ciriani, V., di Vimercati, S.D.C., Foresti, S., Samarati, P.: Microdata protection. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems, vol. 33, pp. 291\u2013321. Springer, New York (2007). https:\/\/doi.org\/10.1007\/978-0-387-27696-0_9"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Department for Communities and Local Government, Ipsos MORI: Citizenship Survey, 2010\u20132011. [data collection]. UK Data Service. SN: 7111 (2012). https:\/\/doi.org\/10.5255\/UKDA-SN-7111-1. Accessed 20 Dec 2017","DOI":"10.5255\/UKDA-SN-7111-1"},{"key":"11_CR7","unstructured":"Drechsler, J.: Synthetic data, where do we come from? Where do we want to go? In: Synthetic Data Workshop; Office of National (2014)"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1007\/978-0-387-09823-4","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"O Maimon","year":"2010","unstructured":"Maimon, O., Rokach, L.: Data Mining and Knowledge Discovery Handbook, p. 704. Springer, Heidelberg (2010)"},{"key":"11_CR9","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-09885-2_1","volume-title":"Advanced Research in Data Privacy","author":"G Navarro-Arribas","year":"2015","unstructured":"Navarro-Arribas, G., Torra, V.: Advanced research on data privacy in the ARES project. In: Navarro-Arribas, G., Torra, V. (eds.) Advanced Research in Data Privacy. SCI, vol. 567, pp. 3\u201314. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-09885-2_1"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Office for National Statistics. Crime Survey for England and Wales, 2015\u20132016. [data collection]. UK Data Service. SN: 8140 (2017). https:\/\/doi.org\/10.5255\/UKDA-SN-8140-1. Accessed 11 Jan 2018","DOI":"10.5255\/UKDA-SN-8140-1"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Office for National Statistics. Social Survey Division, Northern Ireland Statistics and Research Agency, Eurostat (2011). European Union Statistics on Income and Living Conditions, 2009. [data collection]. UK Data Service. SN: 6767 (2009). https:\/\/doi.org\/10.5255\/UKDA-SN-6767-1. Accessed 11 Jan 2018","DOI":"10.5255\/UKDA-SN-6767-1"},{"key":"11_CR12","unstructured":"Pongcharoen, P., Khadwilard, A., Klakankhai, A.: Multi-matrix real-coded genetic algorithm for minimising total costs, in logistics chain network. In: World Academy of Science, Engineering and Technology, vol. 1, no. 11, pp. 574\u2013597 (2007). (Int. J. Econ. Manag. Eng.)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1016\/j.epsr.2005.10.005","volume":"76","author":"L Sun","year":"2006","unstructured":"Sun, L., Zhang, Y., Jiang, C.: A matrix real-coded genetic algorithm to the unit commitment problem. Electr. Pow. Syst. Res. 76, 716\u2013728 (2006)","journal-title":"Electr. Pow. Syst. Res."},{"key":"11_CR14","unstructured":"Wallet, B.C., Marchette, D.J., Solka, J.L.: A matrix representation for genetic algorithms. In: Proceedings of Automatic Object Recognition IV of SPIE Aerosense. Naval Surface Warfare Center Dahlgren, Virginia (1996)"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99771-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:29:43Z","timestamp":1709828983000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99771-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319997704","9783319997711"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99771-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"25 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valencia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/unescoprivacychair.urv.cat\/psd2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}