{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T06:50:20Z","timestamp":1771570220634,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/allerton.2013.6736722","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T17:46:12Z","timestamp":1392313572000},"page":"1616-1623","source":"Crossref","is-referenced-by-count":20,"title":["De-anonymizing private data by matching statistics"],"prefix":"10.1109","author":[{"given":"Jayakrishnan","family":"Unnikrishnan","sequence":"first","affiliation":[]},{"given":"Farid Movahedi","family":"Naini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","author":"cover","year":"2006","journal-title":"Elements of Information Theory 2nd Edition (Wiley Series in Telecommunications and Signal Processing)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"12","volume":"2","author":"west","year":"2001","journal-title":"Introduction to Graph Theory"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/18.32134"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_3"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860017"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869857"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1111\/j.1748-720X.1997.tb01885.x"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456409"},{"key":"8","article-title":"De-anonymization attack on geolocated datasets","author":"gambs","year":"2013","journal-title":"Proceedings of the the 12th IEEE International Conference on Trust Security and Privacy in Computing and Communications (IEEE TrustCom- 13)"}],"event":{"name":"2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton)","location":"Monticello, IL","start":{"date-parts":[[2013,10,2]]},"end":{"date-parts":[[2013,10,4]]}},"container-title":["2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6725831\/6736491\/06736722.pdf?arnumber=6736722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T17:43:05Z","timestamp":1490204585000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6736722\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/allerton.2013.6736722","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}