{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:19:16Z","timestamp":1759133956145,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/infcomw.2017.8116344","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T22:02:07Z","timestamp":1511474527000},"page":"7-12","source":"Crossref","is-referenced-by-count":3,"title":["FuzzyDP: Fuzzy-based big data publishing against inquiry attacks"],"prefix":"10.1109","author":[{"given":"Youyang","family":"Qu","sequence":"first","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Sancheng","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524585"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1109\/TIFS.2014.2368363","article-title":"Correlated differential privacy: Hiding information in non-iid data set","volume":"10","author":"zhu","year":"2015","journal-title":"IEEE Trans Information Forensics and Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487601"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.208"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2607691"},{"journal-title":"Adult Data Set","year":"0","author":"kohavi","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2519329"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref8","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming 33rd International Colloquium ICALP 2006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref2","first-page":"1274","article-title":"Comment on unique in the shopping mall: On the reidentifiability of credit card metadata","volume":"351","author":"david","year":"2016","journal-title":"Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/498255a"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"}],"event":{"name":"2017 IEEE Conference on Computer Communications: Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2017,5,1]]},"location":"Atlanta, GA","end":{"date-parts":[[2017,5,4]]}},"container-title":["2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106907\/8116300\/08116344.pdf?arnumber=8116344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T18:29:37Z","timestamp":1570386577000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8116344\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2017.8116344","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}