{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:09:20Z","timestamp":1725556160747},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642136566"},{"type":"electronic","value":"9783642136573"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13657-3_24","type":"book-chapter","created":{"date-parts":[[2010,5,18]],"date-time":"2010-05-18T15:29:16Z","timestamp":1274196556000},"page":"208-215","source":"Crossref","is-referenced-by-count":0,"title":["Multivariate Equi-width Data Swapping for Private Data Publication"],"prefix":"10.1007","author":[{"given":"Yidong","family":"Li","sequence":"first","affiliation":[]},{"given":"Hong","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-540-24741-8_12","volume-title":"Advances in Database Technology - EDBT 2004","author":"C.C. Aggarwal","year":"2004","unstructured":"Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 183\u2013199. Springer, Heidelberg (2004)"},{"key":"24_CR2","volume-title":"Uci machine learning repository","author":"A. Asuncion","year":"2007","unstructured":"Asuncion, A., Newman, D.: Uci machine learning repository. University of California, Irvine (2007)"},{"key":"24_CR3","first-page":"35","volume":"5","author":"M. Carlson","year":"2002","unstructured":"Carlson, M., Salabasis, M.: A data-swapping technique for generating synthetic samples; a method for disclosure control. Research in Official Statistics\u00a05, 35\u201364 (2002)","journal-title":"Research in Official Statistics"},{"key":"24_CR4","unstructured":"Dalenius, T., Reiss, S.P.: Data-swapping: A technique for disclosure control (extened abstract). In: The Section on Survey Research Methods, Washington, DC, pp. 191\u2013194 (1978)"},{"key":"24_CR5","first-page":"209","volume":"21","author":"S.E. Fienberg","year":"2005","unstructured":"Fienberg, S.E., McIntyre, J.: Data swapping: Variations on a theme by ddalenius and reiss. J. Official Statist.\u00a021, 209\u2013323 (2005)","journal-title":"J. Official Statist."},{"issue":"2","key":"24_CR6","first-page":"65","volume":"5","author":"S.E. Fienberg","year":"2002","unstructured":"Fienberg, S.E.: Comment on a paper by m. carlson and m. salabasis: a data-swapping technique using ranks - a method for disclosure control. Research in Official Statistics\u00a05(2), 65\u201370 (2002)","journal-title":"Research in Official Statistics"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Li, Y., Shen, H.: Equi-width data swapping for private data publication. In: PDCAT 2009: The Tenth International Conference on Parallel and Distributed Computing, Applications and Technologies, Hiroshima, Japan (December 2009)","DOI":"10.1109\/PDCAT.2009.69"},{"key":"24_CR8","unstructured":"Moore, R.A.: Controlled data-swapping techniques for masking public use microdata sets. Research report RR96\/04, U.S. Bureau of the Census, Statistical Research Division, Washington D.C (1996)"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/588111.588134","volume-title":"PODS 1982: Proceedings of the 1st ACM SIGACT-SIGMOD symposium on Principles of database systems","author":"S.P. Reiss","year":"1982","unstructured":"Reiss, S.P., Post, M.J., Dalenius, T.: Non-reversible privacy transformations. In: PODS 1982: Proceedings of the 1st ACM SIGACT-SIGMOD symposium on Principles of database systems, pp. 139\u2013146. ACM, New York (1982)"},{"issue":"4","key":"24_CR10","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s00778-006-0010-5","volume":"15","author":"S. Mukherjee","year":"2006","unstructured":"Mukherjee, S., Chen, Z., Gangopadhyay, A.: A privacy-preserving technique for euclidean distance-based mining algorithms using fourier-related transforms. The VLDB Journal\u00a015(4), 293\u2013315 (2006)","journal-title":"The VLDB Journal"},{"issue":"5","key":"24_CR11","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1287\/mnsc.1050.0503","volume":"52","author":"K. Muralidhar","year":"2006","unstructured":"Muralidhar, K., Sarathy, R.: Data shuffling - a new masking approach for numerical data. Management Science\u00a052(5), 658\u2013670 (2006)","journal-title":"Management Science"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13657-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:48:14Z","timestamp":1558291694000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13657-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642136566","9783642136573"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13657-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}