{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T04:08:54Z","timestamp":1759205334590,"version":"3.38.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T00:00:00Z","timestamp":1290729600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s10618-010-0208-4","type":"journal-article","created":{"date-parts":[[2010,11,25]],"date-time":"2010-11-25T12:41:46Z","timestamp":1290688906000},"page":"379-406","source":"Crossref","is-referenced-by-count":42,"title":["Publishing anonymous survey rating data"],"prefix":"10.1007","volume":"23","author":[{"given":"Xiaoxun","family":"Sun","sequence":"first","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiuyong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Pei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,26]]},"reference":[{"unstructured":"Aggarwal C (2005) On k-anonymity and the curse of dimensionality. In: VLDB, pp 901\u2013909","key":"208_CR1"},{"doi-asserted-by":"crossref","unstructured":"Atzori M, Bonchi F, Giannotti F, Pedreschi D (2005a) Blocking anonymity threats raised by frequent itemset mining. In: ICDM, pp 561\u2013564","key":"208_CR2","DOI":"10.1109\/ICDM.2005.37"},{"doi-asserted-by":"crossref","unstructured":"Atzori M, Bonchi F, Giannotti F, Pedreschi D (2005b) k-anonymous patterns. In: PKDD, pp 10\u201321","key":"208_CR3","DOI":"10.1007\/11564126_7"},{"issue":"4","key":"208_CR4","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1007\/s00778-006-0034-x","volume":"17","author":"M Atzori","year":"2008","unstructured":"Atzori M, Bonchi F, Giannotti F, Pedreschi D (2008) Anonymity preserving pattern discovery. VLDB J 17(4): 703\u2013727","journal-title":"VLDB J"},{"unstructured":"Bayardo RJ, Agrawal R (2005) Data privacy through optimal k-anonymisation. In: ICDE, pp 217\u2013228","key":"208_CR5"},{"doi-asserted-by":"crossref","unstructured":"Frankowski D, Cosley D, Sen S, Terveen LG, Riedl J (2006) You are what you say: privacy risks of public mentions. In: SIGIR, pp 565\u2013572","key":"208_CR6","DOI":"10.1145\/1148170.1148267"},{"doi-asserted-by":"crossref","unstructured":"Fung BC, Wang K, Yu PS (2005) Top-down specialization for information and privacy preservation. In: ICDE, pp 205\u2013216","key":"208_CR7","DOI":"10.1109\/ICDE.2005.143"},{"key":"208_CR8","volume-title":"Computers and intractability: a guide to the theory of $${\\mathcal{NP}}$$ -completeness","author":"MR Garey","year":"1979","unstructured":"Garey MR, Johnson DS (1979) Computers and intractability: a guide to the theory of $${\\mathcal{NP}}$$ -completeness. Freeman, San Francisco"},{"unstructured":"Ghinita G, Tao Y, Kalnis P (2008) On the anonymisation of sparse high-dimensional data. In: Proceedings of international conference on data engineering (ICDE), April, pp 715\u2013724","key":"208_CR9"},{"unstructured":"Hafner K (2006) And if you liked the movie, a Netflix contest may reward you handsomely. New York Times, Oct 2","key":"208_CR10"},{"key":"208_CR11","volume-title":"Coding and information theory","author":"RW Hamming","year":"1980","unstructured":"Hamming RW (1980) Coding and information theory. Prentice Hall, Englewood Cliffs"},{"unstructured":"Hansell S (2006) AOL removes search data on vast group of web users. New York Times, Aug 8","key":"208_CR12"},{"doi-asserted-by":"crossref","unstructured":"He Y, Naughton J (2009) Anonymization of set-valued data via top-down, local generalization. In: VLDB 2009: proceedings of the thirtieth international conference on very large data bases. VLDB endowment","key":"208_CR13","DOI":"10.14778\/1687627.1687733"},{"doi-asserted-by":"crossref","unstructured":"Iyengar V (2002) Transforming data to satisfy privacy constraints. In: SIGKDD, pp 279\u2013288","key":"208_CR14","DOI":"10.1145\/775047.775089"},{"key":"208_CR15","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1109\/TPAMI.2002.1017616","volume":"24","author":"T Kanungo","year":"2002","unstructured":"Kanungo T, Mount DM, Netanyahu NS, Piatko CD, Silverman R, Wu AY (2002) An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans Pattern Anal Mach Intell 24: 881\u2013892","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"doi-asserted-by":"crossref","unstructured":"Kifer D, Gehrke J (2006) Injecting utility into anonymized datasets. In: SIGMOD conference, pp 217\u2013228","key":"208_CR16","DOI":"10.1145\/1142473.1142499"},{"doi-asserted-by":"crossref","unstructured":"LeFevre K, DeWitt D, Ramakrishnan R (2006a) Mondrian multidimensional k-anonymity. In: ICDE, pp 25\u201325","key":"208_CR17","DOI":"10.1109\/ICDE.2006.101"},{"doi-asserted-by":"crossref","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan R (2006b) Workload-aware anonymisation. In: KDD, pp 277\u2013286","key":"208_CR18","DOI":"10.1145\/1150402.1150435"},{"doi-asserted-by":"crossref","unstructured":"Li T, Li N (2009) On the tradeoff between privacy and utility in data publishing. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining (SIGKDD), pp 517\u2013526","key":"208_CR19","DOI":"10.1145\/1557019.1557079"},{"doi-asserted-by":"crossref","unstructured":"Li N, Li T, Venkatasubramanian S (2007) t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE, pp 106\u2013115","key":"208_CR20","DOI":"10.1109\/ICDE.2007.367856"},{"doi-asserted-by":"crossref","unstructured":"Li T, Li N, Zhang J (2009) Modeling and integrating background knowledge in data anonymization. In: ICDE, pp 6\u201317","key":"208_CR21","DOI":"10.1109\/ICDE.2009.86"},{"doi-asserted-by":"crossref","unstructured":"Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: SIGMOD","key":"208_CR22","DOI":"10.1145\/1376616.1376629"},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) l-Diversity: privacy beyond k-anonymity. In: ICDE, p 24","key":"208_CR23","DOI":"10.1109\/ICDE.2006.1"},{"doi-asserted-by":"crossref","unstructured":"Meyerson A, Williams R (2004) On the complexity of optimal k-anonymity. In: Proceedings of the 23rd ACM-SIGMOD-SIGACT-SIGART symposium on the principles of database systems, Paris, France, pp 223\u2013228","key":"208_CR24","DOI":"10.1145\/1055558.1055591"},{"unstructured":"Narayanan A, Shmatikov V (2008) Robust de-anonymisation of large sparse datasets. In: IEEE security and privacy, pp 111\u2013125","key":"208_CR25"},{"issue":"6","key":"208_CR26","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati P (2001) Protecting respondents\u2019 identities in microdata release. IEEE Trans Knowl Data Eng 13(6): 1010\u20131027","journal-title":"IEEE Trans Knowl Data Eng"},{"doi-asserted-by":"crossref","unstructured":"Samarati P, Sweeney L (1998a) Generalizing data to provide anonymity when disclosing information (abstract). In: PODS, p 188","key":"208_CR27","DOI":"10.1145\/275487.275508"},{"unstructured":"Samarati P, Sweeney L (1998b) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report SRI-CSL-98-04, SRI Computer Science Laboratory","key":"208_CR28"},{"issue":"2\u20133","key":"208_CR29","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1111\/j.1748-720X.1997.tb01885.x","volume":"25","author":"L Sweeney","year":"1997","unstructured":"Sweeney L (1997) Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25(2\u20133): 98\u2013110","journal-title":"J Law Med Ethics"},{"issue":"5","key":"208_CR30","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Syst 10(5): 557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl Syst"},{"issue":"4","key":"208_CR31","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"VS Verykios","year":"2004","unstructured":"Verykios VS, Elmagarmid AK, Bertino E, Dasseni E, Saygin Y (2004) Association rule hiding. IEEE Trans Knowl Data Eng 16(4): 434\u2013447","journal-title":"IEEE Trans Knowl Data Eng"},{"doi-asserted-by":"crossref","unstructured":"Wang K, Fung BCM (2006) Anonymizing sequential releases. In: ACM SIGKDD, pp 414\u2013423","key":"208_CR32","DOI":"10.1145\/1150402.1150449"},{"doi-asserted-by":"crossref","unstructured":"Wang K, Yu PS, Chakraborty S (2004) Bottom-up generalization: a data mining solution to privacy protection. In: The fourth IEEE international conference on data mining (ICDM 2004), pp 249\u2013256","key":"208_CR33","DOI":"10.1109\/ICDM.2004.10110"},{"key":"208_CR34","volume-title":"Data mining: practical machine learning tools and techniques","author":"I Witten","year":"2005","unstructured":"Witten I, Frank E (2005) Data mining: practical machine learning tools and techniques. 2nd edn. Morgan Kaufmann, San Francisco","edition":"2"},{"doi-asserted-by":"crossref","unstructured":"Wong R, Li J, Fu A, Wang K (2006) (\u03b1, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: KDD, pp 754\u2013759","key":"208_CR35","DOI":"10.1145\/1150402.1150499"},{"doi-asserted-by":"crossref","unstructured":"Xu Y, Wang K, Fu Ada W-C, Yu PS (2008) Anonymizing transaction databases for publication. In: KDD, pp 767\u2013775","key":"208_CR36","DOI":"10.1145\/1401890.1401982"},{"doi-asserted-by":"crossref","unstructured":"Zhang Q, Koudas N, Srivastava D, Yu T (2007) Aggregate query answering on anonymized tables. In: ICDE, pp 116\u2013125","key":"208_CR37","DOI":"10.1109\/ICDE.2007.367857"},{"issue":"2","key":"208_CR38","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B Zhou","year":"2008","unstructured":"Zhou B, Pei J, Luk WS (2008) A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM SIGKDD Expl 10(2): 12\u201322","journal-title":"ACM SIGKDD Expl"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-010-0208-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-010-0208-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-010-0208-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T06:08:47Z","timestamp":1740722927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-010-0208-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,26]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["208"],"URL":"https:\/\/doi.org\/10.1007\/s10618-010-0208-4","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"type":"print","value":"1384-5810"},{"type":"electronic","value":"1573-756X"}],"subject":[],"published":{"date-parts":[[2010,11,26]]}}}