{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:35:15Z","timestamp":1760708115861,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/fuzzy.2009.5277074","type":"proceedings-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T19:04:47Z","timestamp":1254855887000},"page":"1145-1150","source":"Crossref","is-referenced-by-count":11,"title":["Generation of synthetic data by means of fuzzy c-Regression"],"prefix":"10.1109","author":[{"given":"Isaac","family":"Cano","sequence":"first","affiliation":[]},{"given":"Vicenc","family":"Torra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"195","article-title":"disclosure risk assessment in perturbative microdata protection","volume":"2316","author":"yancey","year":"2002","journal-title":"Inference Control in Statistical Databases"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4_35"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0121-9","author":"willenborg","year":"2001","journal-title":"Elements of Statistical Disclosure Control"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(69)90591-9"},{"key":"16","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/11930242_20","article-title":"using mahalanobis distance-based record linkage for disclosure risk assessment","volume":"4302","author":"torra","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"13","first-page":"181","volume":"11","author":"mateo-sanz","year":"2005","journal-title":"Probabilistic information loss measures in confidentiality protection of continuous microdata Data Mining and Knowledge Discovery"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025610705286"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/91.236552"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.112"},{"journal-title":"Reference data sets to test and compare SDC methods for protection of numerical microdata","year":"2002","author":"brand","key":"3"},{"year":"0","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-70992-5","author":"aggarwal","year":"2008","journal-title":"Privacy Preserving Data Mining Models and Algorithms"},{"key":"10","first-page":"111","author":"domingo-ferrer","year":"2001","journal-title":"A Quantitative Comparison of Disclosure Control Methods for Microdata Confidentiality Disclosure and Data Access Theory and Practical Applications for Statistical Agencies"},{"key":"7","first-page":"227","article-title":"empirical disclosure risk assessment of the ipso synthetic data generators","author":"domingo-ferrer","year":"2006","journal-title":"Monographs in Official Statistics-Work Session On Statistical Data Confidenciality"},{"key":"6","first-page":"807","article-title":"comparing sdc methods methods for microdata on the basis of information loss and disclosure risk","volume":"2","author":"domingo-ferrer","year":"2001","journal-title":"Pre-proceedings of ETK-NTTS"},{"key":"5","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/3-540-47804-3_12","article-title":"lhs-based hybrid microdata vs rank swapping and microaggregation for numeric microdata protection","volume":"2316","author":"dandekar","year":"2002","journal-title":"Inference Control in Statistical Databases"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025658621216"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0007-5"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2007.04.034"}],"event":{"name":"2009 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2009,8,20]]},"location":"Jeju Island, South Korea","end":{"date-parts":[[2009,8,24]]}},"container-title":["2009 IEEE International Conference on Fuzzy Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5247842\/5276875\/05277074.pdf?arnumber=5277074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T00:25:52Z","timestamp":1497831952000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5277074\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2009.5277074","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}