{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:35:17Z","timestamp":1725489317576},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/itw.2017.8278017","type":"proceedings-article","created":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T15:45:14Z","timestamp":1518018314000},"page":"319-323","source":"Crossref","is-referenced-by-count":0,"title":["Computing messages that reveal selected inferences while protecting others"],"prefix":"10.1109","author":[{"given":"Matthew P.","family":"Johnson","sequence":"first","affiliation":[]},{"given":"Liang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Supriyo","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.tm08651"},{"journal-title":"The Information Bottleneck Theory and Applications","year":"2002","author":"slonim","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056488"},{"key":"ref13","article-title":"Optimal mutual information quantization is np-complete","author":"mumey","year":"2003","journal-title":"Neural Information Coding (NIC) workshop poster"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253320"},{"key":"ref5","first-page":"1053","article-title":"Gyrophone: Recognizing speech from gyroscope signals","author":"yan","year":"2014","journal-title":"Usenix Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483382"},{"key":"ref7","first-page":"368","article-title":"The information bottleneck method","author":"tishby","year":"1999","journal-title":"ser Allerton Conference on Communication Control and Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2185677.2185741"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2013.6691224"},{"journal-title":"From the Information Bottleneck to the Privacy Funnel","year":"2014","author":"makhdoumi","key":"ref9"}],"event":{"name":"2017 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2017,11,6]]},"location":"Kaohsiung","end":{"date-parts":[[2017,11,10]]}},"container-title":["2017 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8266764\/8277915\/08278017.pdf?arnumber=8278017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T11:54:20Z","timestamp":1521201260000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8278017\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/itw.2017.8278017","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}