{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:40:47Z","timestamp":1729636847479,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/isi.2015.7165950","type":"proceedings-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T21:16:54Z","timestamp":1438031814000},"page":"120-125","source":"Crossref","is-referenced-by-count":1,"title":["A privacy protection procedure for large scale individual level data"],"prefix":"10.1109","author":[{"given":"Julius","family":"Adebayo","sequence":"first","affiliation":[]},{"given":"Lalana","family":"Kagal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0362-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.02.012"},{"journal-title":"Privacy and Big Data","year":"2011","author":"craig","key":"ref12"},{"journal-title":"Ethics of Big Data Balancing risk and innovation","year":"2012","author":"davis","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972771.8"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-540-25955-8_12","article-title":"On the security of noise addition for privacy in statistical databases","author":"domingo-ferrer","year":"2004","journal-title":"Privacy in Statistical Databases"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.121"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.14"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-004-0173-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref28","article-title":"A better measure of mortgage application denial rates","author":"li","year":"2014","journal-title":"Washington Urban Institute"},{"journal-title":"Big data little privacy","year":"0","author":"reno","key":"ref4"},{"key":"ref27","article-title":"2006 hmda data, the","volume":"93","author":"avery","year":"2007","journal-title":"Fed Res Bull A73"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-642-37210-0_6","article-title":"Pre-dicting personality using novel mobile phone-based metrics","author":"de montjoye","year":"2013","journal-title":"Social Computing Behavioral-Cultural Modeling and Prediction"},{"key":"ref6","article-title":"The mobile data challenge: Big data for mobile computing research","author":"laurila","year":"2012","journal-title":"Pervasive Computing"},{"journal-title":"Data perturbation by rotation for privacy-preserving clustering","year":"2004","author":"oliveira","key":"ref29"},{"key":"ref5","first-page":"xxvii","article-title":"Big data for all: Privacy and user control in the age of analytics","volume":"11","author":"tene","year":"2012","journal-title":"Nw J Tech & Intell Prop"},{"key":"ref8","first-page":"93","article-title":"Big data and due process: Toward a framework to redress predictive privacy harms","volume":"55","author":"crawford","year":"2014","journal-title":"BCL Rev"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-70992-5","author":"aggarwal","year":"2008","journal-title":"A General Survey of Privacy-Preserving Data Mining Models and Algorithms"},{"journal-title":"Big Data A Revolution That Will Transform How We Live Work and Think","year":"2013","author":"mayer-sch\u00f6nberger","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v14i10.2611","article-title":"Gaydar: Facebook friendships expose sexual orientation","volume":"14","author":"jernigan","year":"2009","journal-title":"First Monday"},{"key":"ref1","article-title":"The age of big data","volume":"11","author":"lohr","year":"2012","journal-title":"New York Times"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1291233.1291297"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"journal-title":"Orthogonal principal feature selection","year":"2008","author":"cui","key":"ref24"},{"key":"ref23","first-page":"52","volume":"51","author":"smith","year":"2002","journal-title":"A Tutorial on Principal Components Analysis"},{"key":"ref26","article-title":"Race, ethnicity and high-cost mortgage lending","author":"bayer","year":"2014","journal-title":"National Bureau of Economic Research"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719512"}],"event":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2015,5,27]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153595\/7165923\/07165950.pdf?arnumber=7165950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:29:47Z","timestamp":1498235387000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7165950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/isi.2015.7165950","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}