{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:02:13Z","timestamp":1729645333514,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/fskd.2015.7382192","type":"proceedings-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T23:52:33Z","timestamp":1452815553000},"page":"1647-1652","source":"Crossref","is-referenced-by-count":0,"title":["Graded medical data publishing based on clustering"],"prefix":"10.1109","author":[{"family":"Tong Yi","sequence":"first","affiliation":[]},{"family":"Minyong Shi","sequence":"additional","affiliation":[]},{"family":"Wenqian Shang","sequence":"additional","affiliation":[]},{"family":"Jianxiang Cao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"UCI Repository of Machine Learning Databases [EB\/OL]","year":"1998","author":"hettich","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.144"},{"key":"ref31","first-page":"574","article-title":"Privacy Preserving Approaches for Multiple Sensitive Attributes in Data Publishing","volume":"31","author":"xiao-chun","year":"2008","journal-title":"Chin J Comput (China)"},{"key":"ref30","first-page":"1","article-title":"Document Clustering Method Based on Associated Semantic Link Network","volume":"20","author":"xiang","year":"2013","journal-title":"Journal of Shanghai University (Natural science)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref10","first-page":"1941","article-title":"Achieving (?, k) - Anonymity via Clustering in Data Publishing","volume":"39","author":"gao-ming","year":"2011","journal-title":"Chinese Journal of Electronics"},{"key":"ref11","first-page":"1987","article-title":"Selection Algorithm for Optimized K-values in K-anonymity Model","volume":"32","author":"jin-ling","year":"2011","journal-title":"Journal of Chinese Computer Systems"},{"key":"ref12","first-page":"139","article-title":"Efficient (K,L)-anonymous Privacy Protection Based on Clustering","volume":"41","author":"ruimin","year":"2015","journal-title":"Computer Engineering"},{"key":"ref13","first-page":"555","article-title":"Express information protection application based on K-anonymity","volume":"31","author":"qian","year":"2014","journal-title":"Application Research of Computers"},{"key":"ref14","first-page":"1848","article-title":"L-diversity Model Implementation Based on Improved Clustering Algorithm","volume":"35","author":"jing","year":"2014","journal-title":"Journal of Chinese Computer Systems"},{"key":"ref15","first-page":"32","article-title":"diversity anonymity method based on clustering","volume":"36","author":"fu-zhi","year":"2012","journal-title":"JOURNAL OF YANSHAN UNIVERSITY"},{"key":"ref16","first-page":"2883","article-title":"Data Anonymization Approach for Incomplete Microdata","volume":"24","author":"qi-yuan","year":"2013","journal-title":"Chinese Journal of Software"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TKDE.2010.236","article-title":"Slicing: A New Approach for Privacy preserving Data Publishing","volume":"24","author":"tiancheng","year":"2012","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref18","first-page":"1489","article-title":"Semi-supervised clustering-based anonymous data publishing","volume":"32","author":"gaoming","year":"2011","journal-title":"Journal of Harbin Engineering University"},{"key":"ref19","first-page":"2177","article-title":"(p, a)-sensitive k-anonymity: privacy protection mode","volume":"26","author":"qian","year":"2009","journal-title":"Application Research of Computers"},{"key":"ref28","first-page":"211","article-title":"Attribute Relevancy-based Subspace Clustering Algorithm","volume":"36","author":"hong-ling","year":"2015","journal-title":"Journal of Chinese Computer Systems"},{"key":"ref4","first-page":"282","article-title":"Personalized K-anonymity","volume":"29","author":"ming","year":"2008","journal-title":"Computer Engineering and Design"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2010.03609"},{"key":"ref3","first-page":"144","article-title":"A k-anonymity Study of the Student - Score Publishing","volume":"20","author":"qi","year":"2011","journal-title":"Journal of Yunnan university (Natural Sciences Edition)"},{"key":"ref6","first-page":"139","article-title":"Anatomy: simple and effective privacy preservation","author":"xiao","year":"2006","journal-title":"VLDB"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2610","DOI":"10.3724\/SP.J.1001.2013.04469","article-title":"Soft subspace clustering algorithm for streaming data","volume":"24","author":"zhu","year":"2013","journal-title":"Chinese Journal of Software"},{"key":"ref5","first-page":"1","article-title":"Privacy Preservation in Data Publication for Electrical University Affair","volume":"48","author":"qianyi","year":"2009","journal-title":"Journal of Zhongshan University(Natural Science Edition"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"771","DOI":"10.3724\/SP.J.1001.2010.03466","article-title":"Identity-Reserved Anonymity in Privacy Preserving Data Publishing","volume":"21","author":"yun-hai","year":"2010","journal-title":"Chinese Journal of Software"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"680","DOI":"10.3724\/SP.J.1001.2010.03508","article-title":"Clustering-Based Approach for Data Anonymization","volume":"21","author":"zhi-hui","year":"2010","journal-title":"Chinese Journal of Software"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/ICDE.2006.1","article-title":"1-diversity:privacy beyond k-anonymity","author":"machanavajjhala","year":"2006","journal-title":"Proc 22nd Int'l Conf Data Eng"},{"key":"ref9","first-page":"4303","article-title":"Privacy-preserving data publishing using bipartite graph","volume":"27","author":"li-hui","year":"2010","journal-title":"Application Research of Computers"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"A model for protecting privacy. International Journal on Uncertainty","volume":"10","author":"k-anonymity","year":"2002","journal-title":"Fuzziness and Knowledge based Systems"},{"key":"ref20","article-title":"Research on Privacy-preservation Technology for Publishing Data","author":"ziping","year":"2009","journal-title":"Chongqing University"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1109\/TPAMI.2005.47","article-title":"An improved cluster labeling method for support vector clustering","volume":"27","author":"lee","year":"2005","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"journal-title":"Data Mining Concepts and Techniques","year":"2011","author":"han","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2760","DOI":"10.3724\/SP.J.1001.2011.03903","article-title":"Two-Phase clustering algorithm for complex distributed data","volume":"22","author":"mao-guo","year":"2011","journal-title":"Chinese Journal of Software"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2006.875040"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.3724\/SP.J.1004.2012.01335","article-title":"Cluster Ensemble Based on Spectral Clustering","volume":"38","author":"lin","year":"2012","journal-title":"ACTA Automatica Sinica"},{"key":"ref25","first-page":"1762","article-title":"Distributed Affinity Propagation Clustering Based on MapReduce","volume":"49","author":"weiming","year":"2012","journal-title":"Journal of Computer research and development"}],"event":{"name":"2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2015,8,15]]},"location":"Zhangjiajie, China","end":{"date-parts":[[2015,8,17]]}},"container-title":["2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7374053\/7381900\/07382192.pdf?arnumber=7382192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T14:26:16Z","timestamp":1567520776000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7382192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/fskd.2015.7382192","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}