{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:00:41Z","timestamp":1725706841570},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/icawst.2019.8923333","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T07:10:47Z","timestamp":1575616247000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Re-identifying people from anonymous histories of their activities"],"prefix":"10.1109","author":[{"given":"Hiroshi","family":"Yoshiura","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2208983"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0042"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052714"},{"key":"ref15","first-page":"164183","article-title":"I know what you're buying: privacy breaches on eBay","author":"minkus","year":"2014","journal-title":"Privacy Enhancing Technologies Symposium"},{"key":"ref16","first-page":"121","article-title":"NRF: A Naive re-identification framework","author":"santu","year":"2018","journal-title":"17th Workshop on Privacy in the Electronic Society"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517846"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660278"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197511"},{"key":"ref4","article-title":"On exploiting innocuous user activity for correlating accounts across social network sites","author":"goga","year":"2012","journal-title":"ICSI Technical Reports - University of Berkeley"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1145\/2665943.2665966","article-title":"Stylometric linkability of tweets","author":"almishari","year":"2014","journal-title":"13th Workshop on Privacy in the Electronic Society"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139562"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767898"},{"journal-title":"Database Anonymization Privacy Models Data Utility and Microaggregation-Based Inter-Model Connections","year":"2017","author":"domingo-ferrer","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871535"},{"key":"ref22","first-page":"281","article-title":"A machine learning approach to Twitter user classification","author":"pennacchiotti","year":"2011","journal-title":"5th International AAAI Conference on Weblogs and Social Media"},{"key":"ref21","first-page":"1","article-title":"Loose tweets: an analysis of privacy leaks on Twitter","author":"mao","year":"2011","journal-title":"ACM Workshop on Privacy in Electronic Society"},{"key":"ref23","first-page":"2159","article-title":"Inferring long-term user properties based on users&#x2019; location history","author":"matsuo","year":"2007","journal-title":"Int Joint Conference on Artificial Intelligence"}],"event":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","start":{"date-parts":[[2019,10,23]]},"location":"Morioka, Japan","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8913318\/8923121\/08923333.pdf?arnumber=8923333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:22:59Z","timestamp":1658262179000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8923333\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icawst.2019.8923333","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}