{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:12:24Z","timestamp":1725703944946},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/ciss.2018.8362258","type":"proceedings-article","created":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T18:50:01Z","timestamp":1527187801000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Privacy against matching under anonymization and obfuscation in the Gaussian case"],"prefix":"10.1109","author":[{"given":"Ke","family":"Li","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Pishro-Nik","sequence":"additional","affiliation":[]},{"given":"Dennis L.","family":"Goeckel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195626"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2015.7387946"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2015.39"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583401"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2662940"},{"key":"ref15","first-page":"991","article-title":"Mea-suring Anonymization Privacy\/Analysis Tradeoffs Inherent to Sharing Network Data","author":"yurcik","year":"2008","journal-title":"Proc IEEE Network Operations Management Symp"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006631"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.072011.100049"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2018.8362250"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2443794"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.53"},{"key":"ref5","article-title":"Anomaly-Based Intrusion Detection System for Ad hoc Networxs","author":"korba","year":"2016","journal-title":"IEEE 7th Int Conf on the Network of the Future (NOF)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2498131"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456409"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364931"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2017.8335645"}],"event":{"name":"2018 52nd Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2018,3,21]]},"location":"Princeton, NJ","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 52nd Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8359988\/8362188\/08362258.pdf?arnumber=8362258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T19:13:49Z","timestamp":1528744429000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8362258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ciss.2018.8362258","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}