{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:51:47Z","timestamp":1729662707519,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/fuzzy.2006.1681816","type":"proceedings-article","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T17:01:13Z","timestamp":1158944473000},"page":"887-893","source":"Crossref","is-referenced-by-count":1,"title":["Establishing a benchmark for re-identification methods and its validation using fuzzy clustering"],"prefix":"10.1109","author":[{"given":"V.","family":"Torra","sequence":"first","affiliation":[]},{"given":"J.","family":"Domingo-Ferrer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"journal-title":"Fast Parallel Algorithms for Graph Matching Problems Combinatorial Algebraic & Probabilistic Approach","year":"1998","author":"karpinski","key":"17"},{"key":"18","first-page":"248","article-title":"Multiple imputation and disclosure control: The case of the 1995 Survey of Consumer Finances","author":"kennickell","year":"1999","journal-title":"Record Linkage Techniques"},{"year":"0","author":"winkley","key":"33"},{"key":"15","first-page":"217","article-title":"Gaussian mixture PDF approximation and fuzzy c-means clustering with entropy regularization","author":"ichihashi","year":"2000","journal-title":"Proc of the 4th Asian Fuzzy System Symposium"},{"key":"34","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-3-540-25955-8_18","article-title":"Masking and re-identification methods for public-use microdata: Overview and research problems","volume":"3050","author":"winkler","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"16","first-page":"354","article-title":"Comparisons of attributed graph matching algorithms for computer vision","author":"kalviainen","year":"1990","journal-title":"Proc STEP-90 Finnish Artificial Intelligence Symp"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47804-3_14"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S0266-8920(97)00013-1"},{"journal-title":"Neural Networks Algorithms Applications and Programming Techniques","year":"1991","author":"freeman","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0266-8920(92)90015-A"},{"year":"0","key":"21"},{"key":"20","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/978-3-540-25955-8_24","article-title":"Fast generation of accurate synthetic microdata","volume":"3050","author":"mateo-sanz","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"22","first-page":"537","article-title":"Fuzzy c-means with variables for cluster sizes","author":"miyamoto","year":"2000","journal-title":"16th Fuzzy System Symposium Akita Sept 6-8"},{"journal-title":"Some Results of Individual Ranking Method on the System of Enterprise Accounts Annual Survey Esprit SDC Project Deliverable MI-3\/D2","year":"1999","author":"pagliuca","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s007780100057"},{"key":"25","first-page":"3","article-title":"Data Cleaning: Problems and Current Approaches","volume":"23","author":"rahm","year":"2000","journal-title":"Bulletin of the Technical Committee on Data Engineering"},{"key":"26","first-page":"461","article-title":"Discussion on statistical disclosure limitation","volume":"9","author":"rubin","year":"1993","journal-title":"Journal of Official Statistics"},{"key":"27","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-47804-3_13","article-title":"Postmasking optimization of the tradeoff between information loss and disclosure risk in masked microdata sets","volume":"2316","author":"sebe?","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.4275\/KSLIS.2009.43.4.307"},{"key":"29","first-page":"326","article-title":"Towards the re-identification of individuals in data files with Non-common variables","author":"torra","year":"2000","journal-title":"Proceedings of the 11th European Conference on Artificial Intelligence"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(00)00047-1"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7287.001.0001","author":"fellbaum","year":"1998","journal-title":"WordNet An Electronic Lexical Database"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001661"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2004.834814"},{"key":"7","first-page":"111","article-title":"A quantitative comparison of disclosure control methods for microdata","author":"domingo-ferrer","year":"2001","journal-title":"Confidentiality Disclosure and Data Access Theory and Practical Applications for Statistical Agencies"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50060-3"},{"key":"32","first-page":"355","article-title":"Matching and record linkage","author":"winkler","year":"1995","journal-title":"Business Survey Methods"},{"journal-title":"Data Extraction System","year":"0","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25955-8_14"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47804-3_9"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025666923033"},{"key":"8","first-page":"807","article-title":"Comparing SDC methods for microdata on the basis of information loss and disclosure risk","author":"domingo-ferrer","year":"2001","journal-title":"Proceedings of ETK-NTTS 2001"}],"event":{"name":"2006 IEEE International Conference on Fuzzy Systems","location":"Vancouver, BC, Canada"},"container-title":["2006 IEEE International Conference on Fuzzy Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11093\/35437\/01681816.pdf?arnumber=1681816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T08:42:43Z","timestamp":1555836163000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1681816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2006.1681816","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}