{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:45:57Z","timestamp":1760784357677,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icmlc.2017.8108955","type":"proceedings-article","created":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T21:49:36Z","timestamp":1510868976000},"page":"404-411","source":"Crossref","is-referenced-by-count":11,"title":["An anonymization method combining anatomy and permutation for protecting privacy in microdata with multiple sensitive attributes"],"prefix":"10.1109","author":[{"given":"Yifan","family":"Ye","sequence":"first","affiliation":[]},{"given":"Lixxia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Han","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Fangwei","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"106","article-title":"t-Closeness: privacy beyond k-anonymity and 1-diversity[C]","author":"ninghui","year":"2007","journal-title":"Proc 23rd ICDE"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref10","first-page":"785","article-title":"Utility-based anonymization using local recodin g","author":"xu","year":"2006","journal-title":"KDD 2006 Proceedings of the 12th ACM SI GKDD International Conference on Knowledge Dis covery and Data Mining"},{"key":"ref6","first-page":"139","article-title":"Anatomy: simple and effective privacy preservation","author":"xiao","year":"2006","journal-title":"VLDB 2006 VLDB Endowment"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1145\/1150402.1150499","article-title":"(a, k)-anonymity: an enhanced k-anonymity model for privacypreserving data publishing[C]","author":"wong","year":"2006","journal-title":"Proc of the 12th ACM SIGKDD Conf"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28320-8_10"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1109\/TKDE.2009.65","article-title":"and Donghui Zhang. ANGEL: Enhancing the Utility of Generalization for Privacy Preserving Publication","volume":"21","author":"yufei","year":"2009","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref9","first-page":"574","article-title":"Privacy Preserving Approaches for Multiple Sensitive Attributes in Data Publishing [J]","volume":"31","author":"xiaochun","year":"2008","journal-title":"Chinese Journal of Computers"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"}],"event":{"name":"2017 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2017,7,9]]},"location":"Ningbo","end":{"date-parts":[[2017,7,12]]}},"container-title":["2017 International Conference on Machine Learning and Cybernetics (ICMLC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8095149\/8108935\/08108955.pdf?arnumber=8108955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T16:56:41Z","timestamp":1693241801000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8108955\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2017.8108955","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}