{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T18:44:13Z","timestamp":1769280253389,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1109\/kst.2016.7440495","type":"proceedings-article","created":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T16:20:21Z","timestamp":1458836421000},"page":"89-95","source":"Crossref","is-referenced-by-count":7,"title":["Semantic anonymization in publishing categorical sensitive attributes"],"prefix":"10.1109","author":[{"given":"Ahmed Ali","family":"Mubark","sequence":"first","affiliation":[]},{"given":"Emad","family":"Elabd","sequence":"additional","affiliation":[]},{"given":"Hatem","family":"Abdulkader","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"83","article-title":"New results in disclosure avoidance for tabulations","author":"cox","year":"1987","journal-title":"46th Session Int Statistical Institute"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2307\/2287463"},{"key":"ref12","article-title":"Anonymity: A Formalization of Privacy-l-Diversity","volume":"49","author":"kern","year":"2013","journal-title":"In Proceeding zum Seminar Future Internet (FI) Innovative Internet Technologien und Mobilkommunikation (IITM) und Autonomous Communication Networks (ACN)"},{"key":"ref13","article-title":"Semantic Boolean Arabic Information Retrieval","author":"elabd","year":"2015","journal-title":"Int Arab J"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"ref16","article-title":"UCI machine learning repository, 2013","author":"bache","year":"1990"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref3","first-page":"106","article-title":"t-Closcness: Privacy Beyond k-Anonymity and I-Diversity","volume":"7","author":"li","year":"2007","journal-title":"ICDE"},{"key":"ref6","article-title":"Anonymity in data publishing and distribution","author":"lefevre","year":"2007","journal-title":"University of Wisconsin at Madison"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DBTA.2009.149"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37401-2_55"},{"key":"ref7","first-page":"543","article-title":"Minimality attack in privacy preserving data publishing","author":"wong","year":"2007","journal-title":"Proceedings of International Conference on Very Large Data Bases"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"}],"event":{"name":"2016 8th International Conference on Knowledge and Smart Technology (KST)","location":"Chiangmai, Thailand","start":{"date-parts":[[2016,2,3]]},"end":{"date-parts":[[2016,2,6]]}},"container-title":["2016 8th International Conference on Knowledge and Smart Technology (KST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7435826\/7440466\/7440495.pdf?arnumber=7440495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T09:28:05Z","timestamp":1475141285000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7440495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/kst.2016.7440495","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]}}}