{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T17:46:31Z","timestamp":1774892791163,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/is.2018.8710526","type":"proceedings-article","created":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T17:58:26Z","timestamp":1557424706000},"page":"272-279","source":"Crossref","is-referenced-by-count":99,"title":["A Digital Twin-based Privacy Enhancement Mechanism for the Automotive Industry"],"prefix":"10.1109","author":[{"given":"Violeta","family":"Damjanovic-Behrendt","sequence":"first","affiliation":[{"name":"Internet of Things, Salzburg Research, Salzburg, Austria"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0367"},{"key":"ref38","first-page":"95","article-title":"Pseudo ID: Enhancing Privacy in Federated Login","author":"dey","year":"2010","journal-title":"Proc Hot Topics Privacy Enhancing Technol"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2012.250497"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref31","article-title":"Role-Based and Time-Bound Access and Management of EHR Data","author":"zhang","year":"2013","journal-title":"Security and Communication Networks"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9873-8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0230-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427551"},{"key":"ref35","first-page":"526","author":"chow","year":"2012","journal-title":"SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment"},{"key":"ref34","first-page":"21","article-title":"rivacy-Preserving Digital Identity Management for Cloud Computing","volume":"32","author":"bertino","year":"2009","journal-title":"IEEE Data Eng Bull"},{"key":"ref10","article-title":"Efficient Mining of Partial Periodic Patterns in Time Series Database","author":"han","year":"1999","journal-title":"Proc of the 15th International Conference on Data Engineering (ICDE) 1999"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422732"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47724-1_22"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994784"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772795"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273596"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553505"},{"key":"ref16","first-page":"1345","article-title":"Modelling Human Motion Using Binary Latent Variables","author":"sch\u00f6lkopf","year":"2006","journal-title":"Proceedings of the 19th International Conference on Advances in Neural Information Processing Systems"},{"key":"ref17","first-page":"635","article-title":"Conditional Restricted Boltzmann Machines for Multi-Label Learning with Incomplete Labels","volume":"38","author":"li","year":"2015","journal-title":"Proceedings of the 18th International Conference on AI and Statistics PMLR"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.037"},{"key":"ref19","author":"sutton","year":"2012","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2300846"},{"key":"ref4","author":"bordawekar","year":"2015","journal-title":"Analysing Analytics"},{"key":"ref27","first-page":"1113","article-title":"Machine Learning for Online Hardware Reconfiguration","author":"wildstrom","year":"2007","journal-title":"Proceedings of the 20th International Joint Conference on AI (IJCAI)"},{"key":"ref3","article-title":"The Augmented Digital Twin: Combining Physical and Virtual Data to Unlock the Value of IoT","author":"kucera","year":"2017","journal-title":"White Paper"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2002.1167224"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2012.21"},{"key":"ref8","article-title":"Inferring High-Level Behaviour from Low-Level Sensors","author":"patterson","year":"2003","journal-title":"Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-003-0240-0"},{"key":"ref2","article-title":"Digital Twin for IoT Applications: A Comprehensive Approach to Implementing IoT Digital Twin","year":"2017","journal-title":"Oracle White Paper"},{"key":"ref9","article-title":"Learning and Inferring Transportation Routines","author":"liao","year":"2004","journal-title":"Proc of the National Conference on Artificial Intelligence (AAAI)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-38756-7_4"},{"key":"ref46","year":"2018","journal-title":"Article 29 Data Protection Working Party WP29 Guidelines on Automated Individual Decision-Making and Profiling for the Purpose of Regulation 2016\/679"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2006.302739"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2016.7580849"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2011.47046"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2013.24"},{"key":"ref42","year":"2016","journal-title":"Cyber Security and Resilience of Smart Cars Good Practices and Recommendations"},{"key":"ref24","article-title":"Workload Classification & Software Energy Measurement for Efficient Scheduling on Private Cloud Platforms","author":"smith","year":"2011","journal-title":"Proceedings of ACM SOCC"},{"key":"ref41","article-title":"Smart Car Technologies: A Comprehensive Study of the State of the Art with Analysis and Trends","author":"nakrani","year":"2015","journal-title":"MSc Thesis"},{"key":"ref23","article-title":"Analysisand Lessons from a Publicly Available Google Cluster Trace","author":"chen","year":"2010","journal-title":"EECS Department"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/586111.586114"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.20"},{"key":"ref43","year":"0","journal-title":"Personal Data Anonymization and Pseudonymization under the GDPR"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1773394.1773400"}],"event":{"name":"2018 International Conference on Intelligent Systems (IS)","location":"Funchal, Portugal","start":{"date-parts":[[2018,9,25]]},"end":{"date-parts":[[2018,9,27]]}},"container-title":["2018 International Conference on Intelligent Systems (IS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8703185\/8710451\/08710526.pdf?arnumber=8710526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:42:25Z","timestamp":1754332945000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8710526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/is.2018.8710526","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}