{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:57:29Z","timestamp":1776113849397,"version":"3.50.1"},"reference-count":192,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3287195","type":"journal-article","created":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T18:12:26Z","timestamp":1687198346000},"page":"61829-61854","source":"Crossref","is-referenced-by-count":87,"title":["A Survey of Privacy Risks and Mitigation Strategies in the Artificial Intelligence Life Cycle"],"prefix":"10.1109","volume":"11","author":[{"given":"Sakib","family":"Shahriar","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4879-276X","authenticated-orcid":false,"given":"Sonal","family":"Allana","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, Canada"}]},{"given":"Seyed Mehdi","family":"Hazratifard","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3728-0275","authenticated-orcid":false,"given":"Rozita","family":"Dara","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, Canada"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47072-6_15"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2019.00025"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.003"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106825"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1318"},{"key":"ref52","article-title":"Assessing the local interpretability of machine learning models","author":"slack","year":"2019","journal-title":"arXiv 1902 03501"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.133"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40246-3_55"},{"key":"ref54","first-page":"27","article-title":"Internal versus external cluster validation indexes","volume":"5","author":"rend\u00f3n","year":"2011","journal-title":"Int J Comput Commun"},{"key":"ref169","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1080\/095281300146272"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2022.122120"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372873"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"ref176","first-page":"531","article-title":"Scalable simple random sampling and stratified sampling","author":"meng","year":"2013","journal-title":"Proc 30th Int Conf Mach Learn"},{"key":"ref173","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Proc 20th Int Conf Artif Intell Statist"},{"key":"ref174","article-title":"Enigma: Decentralized computation platform with guaranteed privacy","author":"zyskind","year":"2015","journal-title":"arXiv 1506 03471"},{"key":"ref171","first-page":"1","article-title":"Multiplicative noise for masking continuous data","volume":"1","author":"kim","year":"2003","journal-title":"Statistics"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243818"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2013.06.031"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3406477"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.5771\/0943-7444-2019-2-122"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1055\/s-0038-1634087","article-title":"Semantic interoperability","volume":"45","author":"blobel","year":"2006","journal-title":"Methods Inf Med"},{"key":"ref42","first-page":"1","author":"schwartz","year":"2021","journal-title":"A proposal for identifying and managing bias within artificial intelligence"},{"key":"ref41","article-title":"AI lifecycle models need to be revised. An exploratory study in fintech","author":"haakman","year":"2020","journal-title":"arXiv 2010 02716"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387448"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"ref43","first-page":"83","volume":"5","author":"han","year":"2011","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-016-0094-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0054-y"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106815"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10226-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10023-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/17530350.2019.1574866"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10106-z"},{"key":"ref100","first-page":"48","article-title":"&#x2018;Meaningful information&#x2019; and the right to explanation","author":"selbst","year":"2018","journal-title":"Proc 1st Conf Fairness Accountability Transparency (PMLR)"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940052"},{"key":"ref101","article-title":"Study on the human rights dimensions of automated data processing techniques (in particular algorithms) and possible regulatory implications","author":"wagner","year":"2016"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3203568"},{"key":"ref40","first-page":"13","article-title":"The CRISP-DM model: The new blueprint for data mining","volume":"5","author":"shearer","year":"2000","journal-title":"J Data Warehousing"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1080\/1097198X.2019.1569186"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.3390\/digital1040015"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2019.1600301"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2015.06.319"},{"key":"ref183","year":"2022","journal-title":"DP Notice Generator"},{"key":"ref35","first-page":"1","article-title":"Simple demographics often identify people uniquely","volume":"671","author":"sweeney","year":"2000","journal-title":"Health"},{"key":"ref34","first-page":"329","article-title":"Finding a needle in a haystack or identifying anonymous census records","volume":"2","author":"dalenius","year":"1986","journal-title":"J Offic Statist"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3083916"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"ref31","first-page":"1135","article-title":"Canadian privacy law: The personal information protection and electronic documents act (PIPEDA)","volume":"2","author":"jaar","year":"2009","journal-title":"International In-house Counsel Journal"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/3209889.3209897"},{"key":"ref30","year":"2011","journal-title":"The Fair Information Principles"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106490"},{"key":"ref33","volume":"800","author":"mccallister","year":"2010","journal-title":"Guide to Protecting the Confidentiality of Personally Identifiable Information"},{"key":"ref146","first-page":"10665","article-title":"Adversarial feature desensitization","author":"bashivan","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488512400247"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11345"},{"key":"ref39","year":"2022","journal-title":"What are &#x2018;Controllers&#x2019; and &#x2018;Processors&#x2019;?"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1093\/jlb\/lsz013"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/3510413"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/3359786"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1021\/ci0342472"},{"key":"ref154","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref151","article-title":"An empirical study on hyperparameter tuning of decision trees","author":"mantovani","year":"2019","journal-title":"arXiv 1812 02207"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/CEC45853.2021.9504761"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s11222-009-9153-8"},{"key":"ref24","first-page":"513","article-title":"AttriGuard: A practical defense against attribute inference attacks via adversarial machine learning","author":"jia","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipx027"},{"key":"ref26","article-title":"Resolution on privacy by design","year":"2010","journal-title":"Proc 32nd Int Conf Data Protection Privacy Commissioners"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16664-3"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1920484117"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080832"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11456-5_2"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220072"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00439-018-1919-7"},{"key":"ref27","year":"2022","journal-title":"Regulation on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data and Repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text With EEA Relevance)"},{"key":"ref29","article-title":"An introduction to the California consumer privacy act (CCPA)","author":"goldman","year":"2020"},{"key":"ref166","first-page":"3197","article-title":"Removing bias in multi-modal classifiers: Regularization by maximizing functional entropies","author":"gat","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2020.2998467"},{"key":"ref165","author":"fern\u00e1ndez","year":"2022","journal-title":"Learning from Imbalanced Data Sets"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1089\/big.2016.0047"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2002-6504"},{"key":"ref160","first-page":"4768","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"2017","journal-title":"Proc 31st Int Conf Adv Neural Inf Process Syst"},{"key":"ref161","article-title":"Consistent individualized feature attribution for tree ensembles","author":"lundberg","year":"2018","journal-title":"arXiv 1802 03888"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.041"},{"key":"ref12","article-title":"Security and privacy for artificial intelligence: Opportunities and challenges","author":"oseni","year":"2021","journal-title":"arXiv 2102 04661"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3453444"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2217985"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045078"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s13222-018-0274-0"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1002\/hast.973"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622621"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0059-y"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipx005"},{"key":"ref124","article-title":"State of the art on semantic IS standardization, interoperability & quality","author":"folmer","year":"2011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.lindif.2023.102274"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-019-00710-5"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3399632"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00071"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HSI49210.2020.9142644"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.68.3.459"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"ref93","year":"2021","journal-title":"What is Automated Individual Decision-Making and Profiling?"},{"key":"ref133","first-page":"1","article-title":"Data quality considerations for big data and machine learning: Going beyond data cleaning and transformations","volume":"10","author":"gudivada","year":"2017","journal-title":"Int J Adv Software"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.01.010"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.013"},{"key":"ref95","author":"molnar","year":"2020","journal-title":"Interpretable Machine Learning A Guide for Making Black Box Models Explainable"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.09.073"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1017\/ilm.2020.5"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2942288"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.049"},{"key":"ref91","first-page":"1293","article-title":"Query strategies for evading convex-inducing classifiers","volume":"13","author":"nelson","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02300-7_4"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3134599"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00088"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2344095"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2733381"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.3390\/su11205791"},{"key":"ref135","volume":"793","author":"little","year":"2019","journal-title":"Statistical Analysis with Missing Data"},{"key":"ref87","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2016","journal-title":"arXiv 1611 01236"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1017\/jme.2022.13"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.08.104"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.3390\/rs12061034"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCAF.2017.8344724"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37599-7_60"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-9266-8"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26773-5_30"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3103119"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.10.016"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.08.002"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref108","first-page":"109","article-title":"Man-in-the-middle-attack: Understanding in simple words","volume":"2","author":"mallik","year":"2019","journal-title":"J Teknol Inf Pendidik"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"ref109","year":"2022","journal-title":"OECD Legal Instruments"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.10.003"},{"key":"ref107","first-page":"18","article-title":"Finding security vulnerabilities in Java applications with static analysis","author":"livshits","year":"2005","journal-title":"Proc Usenix Secur Symp"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2018.0083"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533188"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15986-3_17"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363201"},{"key":"ref102","year":"2022","journal-title":"Government Bill (House of Commons) C-27 (44&#x2013;1)-First Reading-Digital Charter Implementation Act 2022-Parliament of Canada"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462533"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"ref1","author":"russell","year":"2010","journal-title":"Artificial Intelligence A Modern Approach"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-020-01646-9"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.2"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3031179"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3144457.3144494"},{"key":"ref111","first-page":"17","author":"johnston","year":"1997","journal-title":"Requirements Engineering A Good Practice Guide"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.42012"},{"key":"ref112","year":"2015","journal-title":"Privacy Impact Assessment Guide"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_21"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICADIWT.2008.4664355"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401926"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381979"},{"key":"ref67","first-page":"377","article-title":"Theoretical results on de-anonymization via linkage attacks","volume":"5","author":"merener","year":"2012","journal-title":"Trans Data Privacy"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00095-8"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.08.002"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00023"},{"key":"ref64","year":"2015","journal-title":"Grand Theft Data Data Exfiltration Study Actors Tactics and Detection"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.008"},{"key":"ref116","year":"2021","journal-title":"Principle (c) Data Minimisation"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.2307\/20650322"},{"key":"ref113","first-page":"47","article-title":"A privacy risk assessment for the Internet of Things in healthcare","author":"elkhodr","year":"2018","journal-title":"Applications of Intelligent Technologies in Healthcare"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1001\/jamainternmed.2018.5295"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2019-0047"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.001"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.4018\/IJSR.2018010101"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009783"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.25"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836184"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-060116-054123"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1500441"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10155147.pdf?arnumber=10155147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T19:40:46Z","timestamp":1689018046000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10155147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":192,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3287195","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}