{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:14:50Z","timestamp":1761621290400},"reference-count":80,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":365,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Biomedical Informatics"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1016\/j.jbi.2016.11.001","type":"journal-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T05:19:50Z","timestamp":1478582390000},"page":"76-96","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":23,"special_numbering":"C","title":["Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints"],"prefix":"10.1016","volume":"65","author":[{"given":"Giorgos","family":"Poulis","sequence":"first","affiliation":[]},{"given":"Grigorios","family":"Loukides","sequence":"additional","affiliation":[]},{"given":"Spiros","family":"Skiadopoulos","sequence":"additional","affiliation":[]},{"given":"Aris","family":"Gkoulalas-Divanis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jbi.2016.11.001_b0005","unstructured":"ICD-9 Taxonomy of Diseases <http:\/\/www.cdc.gov\/nchs\/data\/icd\/icd9cm_guidelines_2011.pdf>."},{"key":"10.1016\/j.jbi.2016.11.001_b0010","first-page":"487","article-title":"Fast algorithms for mining association rules","volume":"vol. 1215","author":"Agrawal","year":"1994"},{"issue":"1","key":"10.1016\/j.jbi.2016.11.001_b0015","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1111\/j.1365-3148.2007.00818.x","article-title":"Evidence-based criteria for the care and selection of blood donors, with some comments on the relationship to blood supply, and emphasis on the management of donation-induced iron depletion","volume":"18","author":"Boulton","year":"2008","journal-title":"Transf. Med."},{"key":"10.1016\/j.jbi.2016.11.001_b0020","series-title":"Advances in Databases: Concepts, Systems and Applications","first-page":"188","article-title":"Efficient k-anonymization using clustering techniques","author":"Byun","year":"2007"},{"key":"10.1016\/j.jbi.2016.11.001_b0025","first-page":"1033","article-title":"rho-uncertainty: inference-proof transaction anonymization","volume":"vol. 3(1)","author":"Cao","year":"2010"},{"issue":"10","key":"10.1016\/j.jbi.2016.11.001_b0030","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1089\/wound.2013.0478","article-title":"Icd-9-cm to icd-10-cm codes: what? why? how?","volume":"2","author":"Cartwright","year":"2013","journal-title":"Adv. Wound Care"},{"issue":"3","key":"10.1016\/j.jbi.2016.11.001_b0035","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s13748-015-0064-y","article-title":"Multi-label learning in classification of patients\u2019 quasi-identifiers","volume":"4","author":"Cotha","year":"2015","journal-title":"Prog. Art. Intell."},{"issue":"1","key":"10.1016\/j.jbi.2016.11.001_b0040","first-page":"35","article-title":"Practicing differential privacy in health care: a review","volume":"6","author":"Dankar","year":"2013","journal-title":"Trans. Data Privacy"},{"issue":"12","key":"10.1016\/j.jbi.2016.11.001_b0045","doi-asserted-by":"crossref","first-page":"e1002823","DOI":"10.1371\/journal.pcbi.1002823","article-title":"Chapter 13: mining electronic health records in the genomics era","volume":"8","author":"Denny","year":"2012","journal-title":"PLoS Comput. Biol."},{"issue":"1","key":"10.1016\/j.jbi.2016.11.001_b0050","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1109\/69.979982","article-title":"Practical data-oriented microaggregation for statistical disclosure control","volume":"14","author":"Domingo-Ferrer","year":"2002","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.jbi.2016.11.001_b0055","doi-asserted-by":"crossref","first-page":"198","DOI":"10.5694\/j.1326-5377.2011.tb03279.x","article-title":"Chronic disease management items in general practice: a population-based study of variation in claims by claimant characteristics","author":"Douglas","year":"2011","journal-title":"Med. J. Aus."},{"key":"10.1016\/j.jbi.2016.11.001_b0060","series-title":"Automata, Languages and Programming","first-page":"1","article-title":"Differential privacy","author":"Dwork","year":"2006"},{"issue":"3","key":"10.1016\/j.jbi.2016.11.001_b0065","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.tmrv.2009.03.003","article-title":"Selection criteria to protect the blood donor in north america and Europe: past (dogma), present (evidence), and future (hemovigilance)","volume":"23","author":"Eder","year":"2009","journal-title":"Transf. Med. Rev."},{"issue":"9574","key":"10.1016\/j.jbi.2016.11.001_b0070","doi-asserted-by":"crossref","first-page":"1724","DOI":"10.1016\/S0140-6736(07)60779-X","article-title":"Risk of cancer after blood transfusion from donors with subclinical cancer: a retrospective cohort study","volume":"369","author":"Edgren","year":"2007","journal-title":"The Lancet"},{"issue":"4","key":"10.1016\/j.jbi.2016.11.001_b0075","first-page":"1","article-title":"Methods for the de-identification of electronic health records for genomic research","volume":"3","author":"Emam","year":"2011","journal-title":"Gen. Med."},{"issue":"5","key":"10.1016\/j.jbi.2016.11.001_b0080","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1197\/jamia.M2716","article-title":"Protecting privacy using k-anonymity","volume":"15","author":"Emam","year":"2008","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"10.1016\/j.jbi.2016.11.001_b0085","unstructured":"IBM Institute for Business Value, The Value of Analytics in Healthcare: From Insights to Outcomes, 2012 <http:\/\/www-935.ibm.com\/services\/us\/gbs\/thoughtleadership\/ibv-healthcare-analytics.html>."},{"key":"10.1016\/j.jbi.2016.11.001_b0090","unstructured":"National Center for Research Resources (US), Widening the use of Electronic Health Record Data for Research, 2009 <http:\/\/videocast.nih.gov\/summary.asp?live=8062>."},{"issue":"3","key":"10.1016\/j.jbi.2016.11.001_b0095","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1145\/355744.355745","article-title":"An algorithm for finding best matches in logarithmic expected time","volume":"3","author":"Friedman","year":"1977","journal-title":"ACM Trans. Math. Softw."},{"key":"10.1016\/j.jbi.2016.11.001_b0100","series-title":"Proceedings of the 21st International Conference on Data Engineering (ICDE)","first-page":"205","article-title":"Top-down specialization for information and privacy preservation","author":"Fung","year":"2005"},{"key":"10.1016\/j.jbi.2016.11.001_b0105","series-title":"33rd International Conference on Very Large Data Bases, VLDB \u201907","first-page":"758","article-title":"Fast data anonymization with low information loss","author":"Ghinita","year":"2007"},{"issue":"2","key":"10.1016\/j.jbi.2016.11.001_b0110","first-page":"9","article-title":"A framework for efficient data anonymization under privacy and accuracy constraints","volume":"34","author":"Ghinita","year":"2009","journal-title":"ACM Trans. Datab. Syst. (TODS)"},{"key":"10.1016\/j.jbi.2016.11.001_b0115","series-title":"Proceedings of the 24th International Conference on Data Engineering (ICDE)","first-page":"744","article-title":"k-anonymization revisited","author":"Gionis","year":"2008"},{"issue":"1","key":"10.1016\/j.jbi.2016.11.001_b0120","first-page":"223","article-title":"Utility-guided clustering-based transaction data anonymization","volume":"5","author":"Gkoulalas-Divanis","year":"2012","journal-title":"Trans. Data Privacy"},{"key":"10.1016\/j.jbi.2016.11.001_b0125","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","article-title":"Publishing data from electronic health records while preserving privacy: a survey of algorithms","volume":"50","author":"Gkoulalas-Divanis","year":"2014","journal-title":"J. Biomed. Inf."},{"issue":"3","key":"10.1016\/j.jbi.2016.11.001_b0130","doi-asserted-by":"crossref","DOI":"10.1136\/bmjopen-2012-001070","article-title":"Socio-demographic and other patient characteristics associated with time between colonoscopy and surgery, and choice of treatment centre for colorectal cancer: a retrospective cohort study","volume":"2","author":"Goldsbury","year":"2012","journal-title":"BMJ Open"},{"key":"10.1016\/j.jbi.2016.11.001_b0135","series-title":"2006 Workshop on Privacy in the Electronic Society","first-page":"77","article-title":"Revisiting the uniqueness of simple demographics in the us population","author":"Golle","year":"2006"},{"key":"10.1016\/j.jbi.2016.11.001_b0140","unstructured":"Medicare Plan Payment Group. Proposed Changes to the CMS-HCC Risk Adjustment Model for Payment, Year 2017 <https:\/\/www.cms.gov\/Medicare\/Health-Plans\/MedicareAdvtgSpecRateStats\/Downloads\/RiskAdj2017ProposedChanges.pdf>."},{"key":"10.1016\/j.jbi.2016.11.001_b0145","series-title":"Data Mining, Southeast Asia Edition: Concepts and Techniques","author":"Han","year":"2006"},{"key":"10.1016\/j.jbi.2016.11.001_b0150","first-page":"934","article-title":"Anonymization of set-valued data via top-down, local generalization","volume":"vol. 2(1)","author":"He","year":"2009"},{"issue":"2","key":"10.1016\/j.jbi.2016.11.001_b0155","doi-asserted-by":"crossref","first-page":"e53875","DOI":"10.1371\/journal.pone.0053875","article-title":"Enabling genomic-phenomic association discovery without sacrificing anonymity","volume":"8","author":"Heatherly","year":"2013","journal-title":"PLoS One"},{"key":"10.1016\/j.jbi.2016.11.001_b0160","unstructured":"INFORMS, Data Mining Contest, 2008 <https:\/\/sites.google.com\/site\/informsdataminingcontest\/>."},{"key":"10.1016\/j.jbi.2016.11.001_b0165","series-title":"Proceedings of the VLDB Endowment (PVLDB)","first-page":"746","article-title":"k-anonymization as spatial indexing: Toward scalable and incremental anonymization","author":"Iwuchukwu","year":"2007"},{"key":"10.1016\/j.jbi.2016.11.001_b0170","series-title":"Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201902","first-page":"279","article-title":"Transforming data to satisfy privacy constraints","author":"Iyengar","year":"2002"},{"key":"10.1016\/j.jbi.2016.11.001_b0175","series-title":"Database Systems for Advanced Applications","first-page":"188","article-title":"\u03c1-uncertainty anonymization by partial suppression","author":"Jia","year":"2014"},{"issue":"1","key":"10.1016\/j.jbi.2016.11.001_b0180","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1471-2288-13-17","article-title":"Ascertaining invasive breast cancer cases; the validity of administrative and self-reported data sources in Australia","volume":"13","author":"Kemp","year":"2013","journal-title":"BMC Med. Res. Methodol."},{"issue":"7","key":"10.1016\/j.jbi.2016.11.001_b0185","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/TKDE.2005.112","article-title":"Minimum spanning tree partitioning algorithm for microaggregation","volume":"17","author":"Laszlo","year":"2005","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.jbi.2016.11.001_b0190","series-title":"ACM SIGMOD International Conference on Management of Data","first-page":"49","article-title":"Incognito: efficient full-domain k-anonymity","author":"LeFevre","year":"2005"},{"key":"10.1016\/j.jbi.2016.11.001_b0195","series-title":"Proceedings of the 22nd International Conference on Data Engineering (ICDE)","first-page":"25","article-title":"Mondrian multidimensional k-anonymity","author":"LeFevre","year":"2006"},{"key":"10.1016\/j.jbi.2016.11.001_b0200","series-title":"Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"277","article-title":"Workload-aware anonymization","author":"LeFevre","year":"2006"},{"key":"10.1016\/j.jbi.2016.11.001_b0205","series-title":"Data Warehousing and Knowledge Discovery","first-page":"405","article-title":"Achieving k-anonymity by clustering in attribute hierarchical structures","author":"Li","year":"2006"},{"key":"10.1016\/j.jbi.2016.11.001_b0210","first-page":"106","article-title":"\u03c4-closeness: privacy beyond k-anonymity and \u2113-diversity","volume":"vol. 7","author":"Li","year":"2007"},{"issue":"7","key":"10.1016\/j.jbi.2016.11.001_b0215","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1109\/TKDE.2009.139","article-title":"Closeness: a new privacy measure for data publishing","volume":"22","author":"Li","year":"2010","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"10.1016\/j.jbi.2016.11.001_b0220","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1136\/jamia.2009.002725","article-title":"The disclosure of diagnosis codes can breach research participants\u2019 privacy","volume":"17","author":"Loukides","year":"2010","journal-title":"J. Am. Med. Inf. Assoc."},{"issue":"1","key":"10.1016\/j.jbi.2016.11.001_b0225","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TITB.2012.2212281","article-title":"Utility-aware anonymization of diagnosis codes","volume":"17","author":"Loukides","year":"2013","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"10.1016\/j.jbi.2016.11.001_b0230","doi-asserted-by":"crossref","first-page":"7898","DOI":"10.1073\/pnas.0911686107","article-title":"Anonymization of electronic medical records for validating genome-wide association studies","volume":"17","author":"Loukides","year":"2010","journal-title":"Proc. Nat. Acad. Sci."},{"issue":"2","key":"10.1016\/j.jbi.2016.11.001_b0235","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s10115-010-0354-4","article-title":"COAT: constraint-based anonymization of transactions","volume":"28","author":"Loukides","year":"2011","journal-title":"Knowl. Inf. Syst."},{"key":"10.1016\/j.jbi.2016.11.001_b0240","series-title":"Database and Expert Systems Applications","first-page":"400","article-title":"Anonymizing transaction data to eliminate sensitive inferences","author":"Loukides","year":"2010"},{"issue":"1","key":"10.1016\/j.jbi.2016.11.001_b0245","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/s10115-012-0544-3","article-title":"Efficient and flexible anonymization of transaction data","volume":"36","author":"Loukides","year":"2013","journal-title":"Knowl. Inf. Syst."},{"key":"10.1016\/j.jbi.2016.11.001_b0250","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.jbi.2014.05.009","article-title":"Disassociation for electronic health record privacy","volume":"50","author":"Loukides","year":"2014","journal-title":"J. Biomed. Inf."},{"issue":"1","key":"10.1016\/j.jbi.2016.11.001_b0255","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","article-title":"\u2113-diversity: privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"10.1016\/j.jbi.2016.11.001_b0260","first-page":"10","article-title":"Automatic de-identification of textual documents in the electronic health record: a review of recent research","author":"Meystre","year":"2010","journal-title":"BMC Med. Res. Methodol."},{"key":"10.1016\/j.jbi.2016.11.001_b0265","series-title":"Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"1285","article-title":"Anonymizing healthcare data: a case study on the blood transfusion service","author":"Mohammed","year":"2009"},{"issue":"3","key":"10.1016\/j.jbi.2016.11.001_b0270","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1136\/amiajnl-2012-001027","article-title":"Privacy-preserving heterogeneous health data sharing","volume":"20","author":"Mohammed","year":"2013","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"10.1016\/j.jbi.2016.11.001_b0275","unstructured":"US National Library of Medicine. CPT Codes <https:\/\/www.nlm.nih.gov\/research\/umls\/sourcereleasedocs\/current\/CPT\/>."},{"key":"10.1016\/j.jbi.2016.11.001_b0280","unstructured":"Information Commissioner\u2019s Office. U.K. Anonymization Code, Federal Register, vol. 67(157), 2002 <http:\/\/www.ico.org.uk\/for_organisations\/data_protection\/topic_guides\/anonymisation\/>."},{"key":"10.1016\/j.jbi.2016.11.001_b0285","unstructured":"National Committee on Vital and Health Statistics. HIPAA Code Set Rule <http:\/\/www.ncvhs.hhs.gov\/091210p06b.pdf>."},{"key":"10.1016\/j.jbi.2016.11.001_b0290","unstructured":"The European Parliament and the Council, EU Directive 95\/46\/EC <http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31995L0046:en:HTML>."},{"issue":"2","key":"10.1016\/j.jbi.2016.11.001_b0295","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/772862.772865","article-title":"Cryptographic techniques for privacy-preserving data mining","volume":"4","author":"Pinkas","year":"2002","journal-title":"ACM SIGKDD Expl. Newslett."},{"key":"10.1016\/j.jbi.2016.11.001_b0300","series-title":"Proceedings of the 17th International Conference on Extending Database Technology, EDBT Athens, Greece, March 24\u201328","first-page":"620","article-title":"SECRETA: a system for evaluating and comparing relational and transaction anonymization algorithms","author":"Poulis","year":"2014"},{"key":"10.1016\/j.jbi.2016.11.001_b0305","series-title":"European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML\/PKDD (3))","first-page":"353","article-title":"Anonymizing data with relational and transaction attributes","author":"Poulis","year":"2013"},{"key":"10.1016\/j.jbi.2016.11.001_b0310","series-title":"International Data Linkage Conference","article-title":"Patterns of prescription opioid use for non-cancer pain in australia: findings from the new south wales 45 and up study","author":"Rogers","year":"2012"},{"issue":"6","key":"10.1016\/j.jbi.2016.11.001_b0315","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","article-title":"Protecting respondents identities in microdata release","volume":"13","author":"Samarati","year":"2001","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.jbi.2016.11.001_b0320","series-title":"Proceedings of the Seventeenth (ACM) (SIGACT-SIGMOD-SIGART) Symposium on Principles of Database Systems","first-page":"188","article-title":"Generalizing data to provide anonymity when disclosing information","author":"Samarati","year":"1998"},{"issue":"2","key":"10.1016\/j.jbi.2016.11.001_b0325","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"Computer"},{"key":"10.1016\/j.jbi.2016.11.001_b0330","series-title":"Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"1525","article-title":"Big data analytics for healthcare","author":"Sun","year":"2013"},{"issue":"05","key":"10.1016\/j.jbi.2016.11.001_b0335","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: a model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncert., Fuzz. Knowl.-Based Syst."},{"key":"10.1016\/j.jbi.2016.11.001_b0340","series-title":"Workshop on Data Science for Social Good at KDD","article-title":"Efficient and tailor-made anonymization for relational and transactional medical records","author":"Takahashi","year":"2014"},{"issue":"3","key":"10.1016\/j.jbi.2016.11.001_b0345","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1109\/TITB.2012.2185850","article-title":"Anonymization of longitudinal electronic medical records","volume":"16","author":"Tamersoy","year":"2012","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"10.1016\/j.jbi.2016.11.001_b0350","first-page":"944","article-title":"Privacy preservation by disassociation","volume":"vol. 5(10)","author":"Terrovitis","year":"2012"},{"key":"10.1016\/j.jbi.2016.11.001_b0355","article-title":"Privacy-preserving anonymization of set-valued data","volume":"vol. 1(1)","author":"Terrovitis","year":"2008"},{"issue":"1","key":"10.1016\/j.jbi.2016.11.001_b0360","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s00778-010-0192-8","article-title":"Local and global recoding methods for anonymizing set-valued data","volume":"20","author":"Terrovitis","year":"2011","journal-title":"VLDB J. \u2013 Int. J. Very Large Data Bases"},{"issue":"2","key":"10.1016\/j.jbi.2016.11.001_b0365","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s10618-005-0007-5","article-title":"Ordinal, continuous and heterogeneous k-anonymity through microaggregation","volume":"11","author":"Domingo-Ferrerand","year":"2005","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.jbi.2016.11.001_b0370","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jdwm.2007070101","article-title":"Multilabel classification: an overview","author":"Tsoumakas","year":"2007","journal-title":"Int. J. Data Warehous. Min."},{"key":"10.1016\/j.jbi.2016.11.001_b0375","series-title":"Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"85","article-title":"Unsupervised learning of disease progression models","author":"Wang","year":"2014"},{"key":"10.1016\/j.jbi.2016.11.001_b0380","series-title":"32nd International Conference on Very Large Data Bases, VLDB \u201906, VLDB Endowment","first-page":"139","article-title":"Anatomy: simple and effective privacy preservation","author":"Xiao","year":"2006"},{"key":"10.1016\/j.jbi.2016.11.001_b0385","series-title":"Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data","first-page":"229","article-title":"Personalized privacy preservation","author":"Xiao","year":"2006"},{"key":"10.1016\/j.jbi.2016.11.001_b0390","series-title":"Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"785","article-title":"Utility-based anonymization using local recoding","author":"Xu","year":"2006"},{"key":"10.1016\/j.jbi.2016.11.001_b0395","series-title":"Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"785","article-title":"Utility-based anonymization using local recoding","author":"Xu","year":"2006"},{"key":"10.1016\/j.jbi.2016.11.001_b0400","series-title":"Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"767","article-title":"Anonymizing transaction databases for publication","author":"Xu","year":"2008"}],"container-title":["Journal of Biomedical Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046416301605?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046416301605?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T05:21:24Z","timestamp":1601184084000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1532046416301605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":80,"alternative-id":["S1532046416301605"],"URL":"https:\/\/doi.org\/10.1016\/j.jbi.2016.11.001","relation":{},"ISSN":["1532-0464"],"issn-type":[{"value":"1532-0464","type":"print"}],"subject":[],"published":{"date-parts":[[2017,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints","name":"articletitle","label":"Article Title"},{"value":"Journal of Biomedical Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jbi.2016.11.001","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}