{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:32:02Z","timestamp":1729675922952,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/grc.2013.6740411","type":"proceedings-article","created":{"date-parts":[[2014,2,21]],"date-time":"2014-02-21T15:19:40Z","timestamp":1392995980000},"page":"219-224","source":"Crossref","is-referenced-by-count":0,"title":["GN: A privacy preserving data publishing method based on generalization and noise techniques"],"prefix":"10.1109","author":[{"given":"Yeling","family":"Ma","sequence":"first","affiliation":[]},{"given":"Jiyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Han","sequence":"additional","affiliation":[]},{"given":"Lixia","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"10","article-title":"A (l, m)-diversity model of desisting the addociated attack on multi-sensitive attributes","volume":"34","author":"luo","year":"2013","journal-title":"Journal of Chinese Computer Systems"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"9","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/TKDE.2008.52","article-title":"Anonymisation by local recoding in data with attribute hierarchical taxonomies","volume":"20","author":"li","year":"2008","journal-title":"IEEE Trans Knowl and Data Eng"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"11"},{"year":"0","key":"12"}],"event":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","start":{"date-parts":[[2013,12,13]]},"location":"TBD, China","end":{"date-parts":[[2013,12,15]]}},"container-title":["2013 IEEE International Conference on Granular Computing (GrC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6729743\/6740363\/06740411.pdf?arnumber=6740411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T04:20:43Z","timestamp":1498105243000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6740411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/grc.2013.6740411","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}