{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T07:03:15Z","timestamp":1774162995835,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/colcom.2007.4553832","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T14:35:25Z","timestamp":1215095725000},"page":"213-221","source":"Crossref","is-referenced-by-count":20,"title":["Privacy protection on sliding window of data streams"],"prefix":"10.1109","author":[{"given":"Weiping","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jianzhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunyu","family":"Ai","sequence":"additional","affiliation":[]},{"given":"Yingshu","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"ref12","first-page":"356","article-title":"Datafiy: a system for providing anonymity in medical data","author":"sweeney","year":"1998","journal-title":"Database Security XI Status and Prospects IFIP TC11 WG11 3 11th Int'l Conf on Database Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref4","author":"blake","year":"1998","journal-title":"UCI repository of machine learning databases"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/776985.776986"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"ref8","first-page":"114","author":"kim","year":"1995","journal-title":"Proc Section on Survey Research Methods"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref9","article-title":"Incognito: Efficient full-domain k-anonymity","author":"dewitt","year":"2006","journal-title":"Proc of the ACM SIGMOD Intl Conf on Management of data"},{"key":"ref1","first-page":"183","article-title":"A condensation approach to privacy preserving data mining","author":"aggarwal","year":"2004","journal-title":"EDBT"}],"event":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","location":"New York, NY, USA","start":{"date-parts":[[2007,11,12]]},"end":{"date-parts":[[2007,11,15]]}},"container-title":["2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543894\/4553792\/04553832.pdf?arnumber=4553832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T23:24:55Z","timestamp":1489706695000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4553832\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/colcom.2007.4553832","relation":{},"subject":[],"published":{"date-parts":[[2007,11]]}}}