{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:59Z","timestamp":1740122399161,"version":"3.37.3"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T00:00:00Z","timestamp":1580342400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T00:00:00Z","timestamp":1580342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10878-020-00527-x","type":"journal-article","created":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T17:05:12Z","timestamp":1580403912000},"page":"1637-1658","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A balm: defend the clique-based attack from a fundamental aspect"],"prefix":"10.1007","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7472-0842","authenticated-orcid":false,"given":"Meng","family":"Han","sequence":"first","affiliation":[]},{"given":"Dongjing","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Jinbao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Liyuan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,30]]},"reference":[{"issue":"4","key":"527_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1228268.1228277","volume":"35","author":"K Aberer","year":"2006","unstructured":"Aberer K, Alonso G, Kossmann D (2006) Data management for a smart earth: the swiss NCCR-MICS initiative. ACM SIGMOD Record 35(4):40\u201345","journal-title":"ACM SIGMOD Record"},{"issue":"6221","key":"527_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti A, Brandimarte L, Loewenstein G (2015) Privacy and human behavior in the age of information. Science 347(6221):509\u2013514","journal-title":"Science"},{"key":"527_CR3","doi-asserted-by":"crossref","unstructured":"Albinali H, Han M, Wang J, Gao H, Li Y (2016) The roles of social network mavens. In: 2016 12th International conference on mobile ad-hoc and sensor networks (MSN). IEEE, pp 1\u20138","DOI":"10.1109\/MSN.2016.009"},{"key":"527_CR4","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.pmcj.2014.09.010","volume":"17","author":"C Bettini","year":"2015","unstructured":"Bettini C, Riboni D (2015) Privacy protection in pervasive systems: state of the art and technical challenges. Pervasive Mob Comput 17:159\u2013174","journal-title":"Pervasive Mob Comput"},{"key":"527_CR5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.endm.2009.02.008","volume":"32","author":"D Br\u00fcgmann","year":"2009","unstructured":"Br\u00fcgmann D, Komusiewicz C, Moser H (2009) On generating triangle-free graphs. Electron Notes Discrete Math 32:51\u201358","journal-title":"Electron Notes Discrete Math"},{"key":"527_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2830307","author":"Z Cai","year":"2018","unstructured":"Cai Z, Zheng X (2018) A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans Netw Sci Eng. https:\/\/doi.org\/10.1109\/TNSE.2018.2830307","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"527_CR7","doi-asserted-by":"crossref","unstructured":"Cai Z, He Z (2019) Trading private range counting over big IoT data. In: 2019 IEEE 39th international conference on distributed computing systems (ICDCS). IEEE, pp 144\u2013153","DOI":"10.1109\/ICDCS.2019.00023"},{"issue":"4","key":"527_CR8","first-page":"577","volume":"15","author":"Z Cai","year":"2016","unstructured":"Cai Z, He Z, Guan X, Li Y (2016) Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans Dependable Secure Comput 15(4):577\u2013590","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"12","key":"527_CR9","doi-asserted-by":"publisher","first-page":"6492","DOI":"10.1109\/TII.2019.2911697","volume":"15","author":"Z Cai","year":"2019","unstructured":"Cai Z, Zheng X, Yu J (2019) A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans Ind Inform 15(12):6492\u20136499","journal-title":"IEEE Trans Ind Inform"},{"key":"527_CR10","unstructured":"Chaudhuri K, Monteleoni C (2009) Privacy-preserving logistic regression. In: Koller D, Schuurmans D, Bengio Y, Bottou L (eds) Advances in neural information processing systems, pp 289\u2013296"},{"key":"527_CR11","unstructured":"Chaudhuri K, Sarwate A, Sinha K (2012) Near-optimal differentially private principal components. In: Pereira F, Burges CJC, Bottou L, Weinberger KQ (eds) Advances in neural information processing systems, pp 989\u2013997"},{"issue":"429\u2013444","key":"527_CR12","first-page":"2","volume":"15","author":"T Dalenius","year":"1977","unstructured":"Dalenius T (1977) Towards a methodology for statistical disclosure control. Statistik Tidskrift 15(429\u2013444):2\u20131","journal-title":"Statistik Tidskrift"},{"key":"527_CR13","doi-asserted-by":"crossref","unstructured":"Dankar FK, El\u00a0Emam K (2012) The application of differential privacy to health data. In: Proceedings of the 2012 joint EDBT\/ICDT workshops. ACM, pp 158\u2013166","DOI":"10.1145\/2320765.2320816"},{"issue":"12","key":"527_CR14","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.1109\/TMC.2012.208","volume":"12","author":"R Dewri","year":"2013","unstructured":"Dewri R (2013) Local differential perturbations: location privacy under approximate knowledge attackers. IEEE Trans Mob Comput 12(12):2360\u20132372","journal-title":"IEEE Trans Mob Comput"},{"key":"527_CR15","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: International conference on theory and applications of models of computation. Springer, pp. 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"issue":"1","key":"527_CR16","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork C (2011) A firm foundation for private data analysis. Commun ACM 54(1):86\u201395","journal-title":"Commun ACM"},{"issue":"1","key":"527_CR17","first-page":"8","volume":"2","author":"C Dwork","year":"2008","unstructured":"Dwork C, Naor M (2008) On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J Priv Confid 2(1):8","journal-title":"J Priv Confid"},{"key":"527_CR18","doi-asserted-by":"crossref","unstructured":"Dwork C, Rothblum GN, Vadhan S (2010) Boosting and differential privacy. In: 2010 51st Annual IEEE symposium on foundations of computer science (FOCS). IEEE, pp 51\u201360","DOI":"10.1109\/FOCS.2010.12"},{"issue":"3\u20134","key":"527_CR19","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A et al (2014) The algorithmic foundations of differential privacy. Found Trends\u00ae Theor Comput Sci 9(3\u20134):211\u2013407","journal-title":"Found Trends\u00ae Theor Comput Sci"},{"key":"527_CR20","doi-asserted-by":"crossref","unstructured":"Goldwasser S (1997) Multi party computations: past and present. In: Proceedings of the sixteenth annual ACM symposium on principles of distributed computing. ACM, pp 1\u20136","DOI":"10.1145\/259380.259405"},{"issue":"3","key":"527_CR21","first-page":"11","volume":"4","author":"GG Guly\u00e1s","year":"2011","unstructured":"Guly\u00e1s GG, Imre S (2011) Analysis of identity separation against a passive clique-based de-anonymization attack. Infocommun J 4(3):11\u201320","journal-title":"Infocommun J"},{"key":"527_CR22","doi-asserted-by":"crossref","unstructured":"Guly\u00e1s GG, Simon B, Imre S (2016) An efficient and robust social network de-anonymization attack. In: Proceedings of the 2016 ACM on workshop on privacy in the electronic society. ACM, pp 1\u201311","DOI":"10.1145\/2994620.2994632"},{"key":"527_CR23","doi-asserted-by":"crossref","unstructured":"Han M, Li J, Cai Z, Han Q (2016) Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks. In: IEEE international conferences on social computing and networking (SocialCom). IEEE 2016, pp 284\u2013292","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.51"},{"key":"527_CR24","doi-asserted-by":"crossref","unstructured":"Han M, Li L, Peng X, Hong Z, Li M (2017) Information privacy of cyber transportation system: opportunities and challenges. In: Proceedings of the 6th annual conference on research in information technology. ACM, pp 23\u201328. https:\/\/dl.acm.org\/citation.cfm?id=31256","DOI":"10.1145\/3125649.3125652"},{"key":"527_CR25","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1016\/j.procs.2018.03.079","volume":"129","author":"M Han","year":"2018","unstructured":"Han M, Wang J, Yan M, Ai C, Duan Z, Hong Z (2018) Near-complete privacy protection: cognitive optimal strategy in location-based services. Procedia Comput Sci 129:298\u2013304","journal-title":"Procedia Comput Sci"},{"key":"527_CR26","doi-asserted-by":"crossref","unstructured":"Ho SS, Ruan S (2011) Differential privacy for location pattern mining. In: Proceedings of the 4th ACM SIGSPATIAL international workshop on security and privacy in GIS and LBS. ACM, pp 17\u201324","DOI":"10.1145\/2071880.2071884"},{"key":"527_CR27","doi-asserted-by":"crossref","unstructured":"Ji S, Li W, Srivatsa M, He JS, Beyah R (2014) Structure based data de-anonymization of social networks and mobility traces. In: International conference on information security. Springer, pp 237\u2013254","DOI":"10.1007\/978-3-319-13257-0_14"},{"key":"527_CR28","unstructured":"Ji S, Li W, Mittal P, Hu X, Beyah RA (2015) Secgraph: a uniform and open-source evaluation system for graph data anonymization and de-anonymization. In: USENIX security symposium, pp 303\u2013318"},{"issue":"2","key":"527_CR29","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1109\/COMST.2016.2633620","volume":"19","author":"S Ji","year":"2016","unstructured":"Ji S, Mittal P, Beyah R (2016) Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: a survey. IEEE Commun Surv Tutor 19(2):1305\u20131326","journal-title":"IEEE Commun Surv Tutor"},{"key":"527_CR30","doi-asserted-by":"crossref","unstructured":"Karp RM (1972) Reducibility among combinatorial problems. In: Miller RE, Thatcher JW, Bohlinger JD (eds) Complexity of computer computations. Springer, pp 85\u2013103","DOI":"10.1007\/978-1-4684-2001-2_9"},{"key":"527_CR31","unstructured":"Leskovec J, Mcauley JJ (2012) Learning to discover social circles in ego networks. In: Pereira F, Burges CJC, Bottou L, Weinberger KQ (eds) Advances in neural information processing systems (NIPS), pp 539\u2013547"},{"issue":"1","key":"527_CR32","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"J Leskovec","year":"2009","unstructured":"Leskovec J, Lang KJ, Dasgupta A, Mahoney MW (2009) Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math 6(1):29\u2013123","journal-title":"Internet Math"},{"key":"527_CR33","doi-asserted-by":"crossref","unstructured":"Leskovec J, Huttenlocher D, Kleinberg J (2010) Predicting positive and negative links in online social networks. In: Proceedings of the 19th international conference on world wide web. ACM, pp 641\u2013650","DOI":"10.1145\/1772690.1772756"},{"key":"527_CR34","doi-asserted-by":"crossref","unstructured":"Leskovec J, Huttenlocher D, Kleinberg J (2010) Signed networks in social media. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 1361\u20131370","DOI":"10.1145\/1753326.1753532"},{"issue":"2","key":"527_CR35","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1109\/TCSS.2018.2797225","volume":"5","author":"J Li","year":"2018","unstructured":"Li J, Cai Z, Wang J, Han M, Li Y (2018) Truthful incentive mechanisms for geographical position conflicting mobile crowdsensing systems. IEEE Trans Comput Soc Syst 5(2):324\u2013334","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"527_CR36","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.comnet.2018.11.036","volume":"150","author":"K Li","year":"2019","unstructured":"Li K, Tian L, Li W, Luo G, Cai Z (2019) Incorporating social interaction into three-party game towards privacy protection in IoT. Computer Netw 150:90\u2013101","journal-title":"Computer Netw"},{"issue":"4","key":"527_CR37","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2018.1700349","volume":"32","author":"Y Liang","year":"2018","unstructured":"Liang Y, Cai Z, Yu J, Han Q, Li Y (2018) Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw 32(4):8\u201314","journal-title":"IEEE Netw"},{"key":"527_CR38","doi-asserted-by":"crossref","unstructured":"Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD international conference on management of data. ACM, pp 93\u2013106","DOI":"10.1145\/1376616.1376629"},{"key":"527_CR39","doi-asserted-by":"crossref","unstructured":"Naor M, Nissim K (2001) Communication preserving protocols for secure function evaluation. In: Proceedings of the thirty-third annual ACM symposium on theory of computing. ACM, pp 590\u2013599","DOI":"10.1145\/380752.380855"},{"key":"527_CR40","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: 2009 30th IEEE symposium on security and privacy. IEEE, pp 173\u2013187","DOI":"10.1109\/SP.2009.22"},{"key":"527_CR41","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shi E, Rubinstein BI (2011) Link prediction by de-anonymization: how we won the kaggle social network challenge. In: The 2011 international joint conference on neural networks (IJCNN). IEEE, pp 1825\u20131834","DOI":"10.1109\/IJCNN.2011.6033446"},{"key":"527_CR42","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198566076.001.0001","volume-title":"Invitation to fixed-parameter algorithms","author":"R Niedermeier","year":"2006","unstructured":"Niedermeier R (2006) Invitation to fixed-parameter algorithms. University Press, Oxford"},{"key":"527_CR43","doi-asserted-by":"crossref","unstructured":"Niu B, Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: INFOCOM, 2014 proceedings IEEE. IEEE, pp 754\u2013762","DOI":"10.1109\/INFOCOM.2014.6848002"},{"issue":"8","key":"527_CR44","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TKDE.2011.105","volume":"24","author":"X Pan","year":"2012","unstructured":"Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506\u20131519","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"527_CR45","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","volume":"16","author":"C Perera","year":"2014","unstructured":"Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2014) Context aware computing for the internet of things: a survey. IEEE Commun Surv Tutor 16(1):414\u2013454","journal-title":"IEEE Commun Surv Tutor"},{"key":"527_CR46","doi-asserted-by":"crossref","unstructured":"Potharaju R, Carbunar B, Nita-Rotaru C (2010) iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, pp 723\u2013725","DOI":"10.1145\/1866307.1866410"},{"key":"527_CR47","first-page":"351","volume":"2003","author":"M Richardson","year":"2003","unstructured":"Richardson M, Agrawal R, Domingos P (2003) Trust management for the semantic web. Semant Web-ISWC 2003:351\u2013368","journal-title":"Semant Web-ISWC"},{"key":"527_CR48","doi-asserted-by":"crossref","unstructured":"Sala A, Zhao X, Wilson C, Zheng H, Zhao BY (2011) Sharing graphs using differentially private graph models. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference. ACM, pp 81\u201398","DOI":"10.1145\/2068816.2068825"},{"issue":"5","key":"527_CR49","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MSP.2013.2259911","volume":"30","author":"AD Sarwate","year":"2013","unstructured":"Sarwate AD, Chaudhuri K (2013) Signal processing and machine learning with differential privacy: algorithms and challenges for continuous data. IEEE Signal Process Magazine 30(5):86\u201394","journal-title":"IEEE Signal Process Magazine"},{"key":"527_CR50","doi-asserted-by":"crossref","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, pp 1310\u20131321","DOI":"10.1145\/2810103.2813687"},{"key":"527_CR51","doi-asserted-by":"crossref","unstructured":"Srivatsa M, Hicks M (2012) Deanonymizing mobility traces: using social network as a side-channel. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 628\u2013637","DOI":"10.1145\/2382196.2382262"},{"issue":"05","key":"527_CR52","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"key":"527_CR53","doi-asserted-by":"crossref","unstructured":"Xiao Y, Xiong L (2015) Protecting locations with differential privacy under temporal correlations. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, pp 1298\u20131309","DOI":"10.1145\/2810103.2813640"},{"issue":"1","key":"527_CR54","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10115-013-0693-z","volume":"42","author":"J Yang","year":"2015","unstructured":"Yang J, Leskovec J (2015) Defining and evaluating network communities based on ground-truth. Knowl I Syst 42(1):181\u2013213","journal-title":"Knowl I Syst"},{"issue":"2","key":"527_CR55","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1137\/0210021","volume":"10","author":"M Yannakakis","year":"1981","unstructured":"Yannakakis M (1981) Edge-deletion problems. SIAM J Comput 10(2):297\u2013309","journal-title":"SIAM J Comput"},{"key":"527_CR56","doi-asserted-by":"crossref","unstructured":"Yartseva L, Grossglauser M (2013) On the performance of percolation graph matching. In: Proceedings of the first ACM conference on online social networks. ACM, pp 119\u2013130","DOI":"10.1145\/2512938.2512952"},{"key":"527_CR57","doi-asserted-by":"crossref","unstructured":"Yildiz H, Kruegel C (2012) Detecting social cliques for automated privacy control in online social networks. In: 2012 IEEE international conference on pervasive computing and communications workshops (PERCOM Workshops). IEEE, pp 353\u2013359","DOI":"10.1109\/PerComW.2012.6197509"},{"key":"527_CR58","doi-asserted-by":"crossref","unstructured":"Ying X, Wu X (2008) Randomizing social networks: a spectrum preserving approach. In: Proceedings of the 2008 SIAM international conference on data mining. SIAM, pp 739\u2013750","DOI":"10.1137\/1.9781611972788.67"},{"issue":"4","key":"527_CR59","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/1369118X.2013.777757","volume":"16","author":"AL Young","year":"2013","unstructured":"Young AL, Quan-Haase A (2013) Privacy protection strategies on facebook: the internet privacy paradox revisited. Inf Commun Soc 16(4):479\u2013500","journal-title":"Inf Commun Soc"},{"key":"527_CR60","doi-asserted-by":"crossref","unstructured":"Zhang J, Li Q, Schooler EM (2012) iHEMS: An information-centric approach to secure home energy management. In: 2012 IEEE third international conference on smart grid communications (SmartGridComm). IEEE, pp 217\u2013222","DOI":"10.1109\/SmartGridComm.2012.6485986"},{"key":"527_CR61","doi-asserted-by":"publisher","first-page":"3313","DOI":"10.1109\/TSG.2016.2626317","volume":"9","author":"J Zhao","year":"2016","unstructured":"Zhao J, Liu J, Qin Z, Ren K (2016) Privacy protection scheme based on remote anonymous attestation for trusted smart meters. IEEE Trans Smart Grid 9:3313\u20133320","journal-title":"IEEE Trans Smart Grid"},{"issue":"9","key":"527_CR62","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCOM.2018.1701245","volume":"56","author":"X Zheng","year":"2018","unstructured":"Zheng X, Cai Z, Li Y (2018) Data linkage in smart internet of things systems: a consideration from a privacy perspective. IEEE Commun Magazine 56(9):55\u201361","journal-title":"IEEE Commun Magazine"},{"key":"527_CR63","doi-asserted-by":"crossref","unstructured":"Zhou Y, Han M, Liu L, He JS, Wang Y (2018) Deep learning approach for cyberattack detection. In: IEEE INFOCOM 2018-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 262\u2013267","DOI":"10.1109\/INFCOMW.2018.8407032"},{"key":"527_CR64","doi-asserted-by":"publisher","first-page":"4614","DOI":"10.1109\/JIOT.2018.2872458","volume":"6","author":"S Zhu","year":"2018","unstructured":"Zhu S, Li W, Li H, Tian L, Luo G, Cai Z (2018) Coin hopping attack in blockchain-based IoT. IEEE Internet of Things Journal 6:4614\u20134626","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-020-00527-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10878-020-00527-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-020-00527-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T08:44:33Z","timestamp":1664354673000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10878-020-00527-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,30]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["527"],"URL":"https:\/\/doi.org\/10.1007\/s10878-020-00527-x","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"type":"print","value":"1382-6905"},{"type":"electronic","value":"1573-2886"}],"subject":[],"published":{"date-parts":[[2020,1,30]]},"assertion":[{"value":"30 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}