{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T07:25:23Z","timestamp":1745047523045,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/iscisc.2013.6767335","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T19:25:49Z","timestamp":1395343549000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Privacy preservation by k-anonymizing Ngrams of time series"],"prefix":"10.1109","author":[{"given":"Mohammad-Reza","family":"Zare-Mirakabad","sequence":"first","affiliation":[]},{"given":"Fatemeh","family":"Kaveh-Yazdy","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Tahmasebi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Speech and Language Processing","year":"2009","author":"jurafsky","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.79"},{"key":"11","doi-asserted-by":"crossref","first-page":"64","DOI":"10.4018\/jdwm.2011100104","article-title":"Preserving privacy in time series data mining","volume":"7","author":"fu","year":"2011","journal-title":"Int J Data Warehous Min"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2361407.2361435"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"2","article-title":"What if we want to publish data? Privacy preservation by k-anonymity and l-diversity","author":"zare-mirakabad","year":"2008","journal-title":"The 5th Iranian Security Community Conference (ISCISC'08)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108650"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2023582.2023594"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2011.02.013"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.75"},{"key":"4","article-title":"Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression","author":"samarati","year":"1998","journal-title":"IEEE Symp Research in Security and Privacy"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.249"},{"key":"8","first-page":"3619","article-title":"Publishing time-series data under preservation of privacy and distance orders","volume":"8","author":"choi","year":"2012","journal-title":"International Journal of Innovative Computing Information and Control (IJICIC)"}],"event":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2013,8,29]]},"location":"Yazd, Iran","end":{"date-parts":[[2013,8,30]]}},"container-title":["2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6765549\/6767314\/06767335.pdf?arnumber=6767335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:00:51Z","timestamp":1498125651000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6767335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2013.6767335","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}