{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:18:10Z","timestamp":1760955490494,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/cscwd.2014.6846862","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T11:52:07Z","timestamp":1406634727000},"page":"319-324","source":"Crossref","is-referenced-by-count":5,"title":["A K-anonymity clustering algorithm based on the information entropy"],"prefix":"10.1109","author":[{"given":"Jianpei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ying","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"582","author":"d","year":"2002","journal-title":"an entropy-based algorithm for categorical clustering[C]\/\/Proceedings Press of ACM CIK M"},{"key":"ref3","first-page":"14","article-title":"Incognito: Efficient Full-Domain k-Aonymity","author":"fevre","year":"2005","journal-title":"In SIGMOD 2005 June"},{"key":"ref10","article-title":"An Overview of Privacy Preserving Data Mining","author":"qi","year":"2010","journal-title":"3rd International Conference on Future BioMedical Information Engineering (FBIE 2010)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2004.10110"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/s11390-008-9121-3","article-title":"An efficient clustering algorithm for k-anonymisation","volume":"23","author":"grigorios","year":"2008","journal-title":"Journal of Computer Science and Technology"},{"key":"ref7","first-page":"405","article-title":"Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures","author":"li","year":"2006","journal-title":"DaWak 2006 LNCS 4081"},{"journal-title":"Efficient k-Anonymity Using Clustering Technique Cerias Tech Report","year":"2006","author":"byun","key":"ref2"},{"journal-title":"2012 National Conference on Research on the Anonymity Method Based-on k-anonymity for Electronic Commerce Information Technology and Computer Science","year":"2012","author":"gaizhen","key":"ref9"},{"key":"ref1","first-page":"26","author":"aggarwal","year":"2006","journal-title":"Achieving Anonymity Via ClusteringPODS'06"}],"event":{"name":"2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2014,5,21]]},"location":"Hsinchu, Taiwan","end":{"date-parts":[[2014,5,23]]}},"container-title":["Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6839905\/6846800\/06846862.pdf?arnumber=6846862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:30:07Z","timestamp":1498138207000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6846862\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2014.6846862","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}