{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:12:35Z","timestamp":1730272355087,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,5]]},"DOI":"10.1109\/iscc53001.2021.9631457","type":"proceedings-article","created":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T15:46:50Z","timestamp":1639583210000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Proportional representation to increase data utility in k-anonymous tables"],"prefix":"10.1109","author":[{"given":"Fabien","family":"Viton","sequence":"first","affiliation":[]},{"given":"Clemence","family":"Mauger","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Dequen","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Guerin","sequence":"additional","affiliation":[]},{"given":"Gael","family":"Le Mahec","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11823728_39"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66172-4_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71703-4_18"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1379287.1379297"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150504"},{"key":"ref18","article-title":"Modeling and evaluation of k-anonymization metrics","author":"mauger","year":"2020","journal-title":"PrivacyPreserving Artificial Intelligence Workshop of AAAI20"},{"key":"ref19","first-page":"1","article-title":"Does k-anonymous microaggregation affect machine-learned macrotrends?","author":"rodriguez-hoyos","year":"2018","journal-title":"IEEE Access"},{"key":"ref4","first-page":"1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"33rd International Colloquium on Automata Languages and Programming part II (ICALP 2006) ser Lecture Notes in Computer Science"},{"journal-title":"Registered voters in the state of Florida","year":"2020","key":"ref28"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"journal-title":"Machine Learning Repository","year":"0","key":"ref27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref29","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref7","first-page":"313","article-title":"Measures of disclosure risk and harm","volume":"9","author":"lambert","year":"1993","journal-title":"Journal of Official Statistic-Stockholm"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2005.08.001"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref20","first-page":"111","author":"de oliveira silva","year":"2017","journal-title":"Privacy and data mining Evaluating the impact of data anonymization on classification algorithms"},{"key":"ref22","article-title":"Early prediction of heart disease using decision tree algorithm","volume":"3","author":"karthiga","year":"2017","journal-title":"International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079967"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01298-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ITCOSP.2017.8303085"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.19"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/sym12091526"}],"event":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2021,9,5]]},"location":"Athens, Greece","end":{"date-parts":[[2021,9,8]]}},"container-title":["2021 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631377\/9631248\/09631457.pdf?arnumber=9631457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:54:25Z","timestamp":1652187265000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iscc53001.2021.9631457","relation":{},"subject":[],"published":{"date-parts":[[2021,9,5]]}}}