{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:04:06Z","timestamp":1729616646144,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/ntms.2014.6814045","type":"proceedings-article","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T18:40:53Z","timestamp":1400265653000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Medical Reports Publishing for Cluster Analysis"],"prefix":"10.1109","author":[{"given":"Ali","family":"Hmood","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"C. M. Fung","sequence":"additional","affiliation":[]},{"given":"Farkhund","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.111"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2862"},{"key":"35","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s10852-005-9022-1","article-title":"Clustering rules: A comparison of partitioning and hierarchical clustering algorithms","volume":"5","author":"reynolds","year":"1992","journal-title":"Journal of Mathematical Modelling and Algorithms"},{"key":"18","first-page":"217","article-title":"Data privacy through optimal kanonymization","author":"bayardo","year":"2005","journal-title":"Data Engineering 2005 ICDE 2005 Proceedings 21st International Conference on"},{"journal-title":"Finding Groups in Data An Introduction to Cluster Analysis","year":"1990","author":"kaufman","key":"36"},{"key":"15","doi-asserted-by":"crossref","first-page":"680","DOI":"10.5858\/2003-127-680-CMDS","article-title":"Concept-match medical data scrubbing: How pathology text can be used in research","volume":"127","author":"berman","year":"2003","journal-title":"Arch Pathol Lab Med"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"16","article-title":"Algorithmic de-identification of VA medical exam text for HIPAA privacy compliance: Preliminary findings","volume":"1590","author":"fielstein","year":"2004","journal-title":"MEDINFO"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(95)00094-1"},{"key":"13","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1197\/jamia.M2441","article-title":"State-of-The-Art anonymization of medical records using an iterative machine learning framework","volume":"14","author":"szarvas","year":"2007","journal-title":"J Am Med Inform Assoc"},{"key":"14","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1186\/1472-6947-6-12","article-title":"Development and evaluation of an open source software tool for deidentification of pathology reports","volume":"6","author":"beckwith","year":"2006","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1142\/9789812776136_0062"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2009.07.006"},{"journal-title":"Information Retrival","year":"1979","author":"van rijsbergen","key":"38"},{"key":"12","first-page":"10","article-title":"Identifying personal health information using support vector machines","author":"guo","year":"2006","journal-title":"I2b2 Workshop on Challenges in Natural Language Processing for Clinical Data"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"23","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1109\/ICDM.2004.10110","article-title":"Bottom-up generalization: A data mining solution to privacy protection","author":"wang","year":"2004","journal-title":"Data Mining 2004 ICDM'04 Fourth IEEE International Conference on"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"25","first-page":"205","article-title":"Top-down specialization for information and privacy preservation","author":"fung","year":"2005","journal-title":"Data Engineering 2005 ICDE 2005 Proceedings 21st International Conference on"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1015"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.12.001"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.3115\/1220835.1220844"},{"key":"29","first-page":"333","article-title":"Replacing personally-identifying information in medical records, the Scrub system","author":"sweeney","year":"1996","journal-title":"Proc AMIA Annu Fall Symp"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-001027"},{"key":"2","article-title":"Protecting privacy when disclosing information: K-Anonymity and its enforcement through generalization and suppression","author":"samarati","year":"1998","journal-title":"Technical Report SRI Internationa"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"10","first-page":"10","article-title":"Automatic deidentification by using sentence features and label consistency","author":"aramaki","year":"2006","journal-title":"I2b2 Workshop on Challenges in Natural Language Processing for Clinical Data"},{"key":"30","first-page":"757","article-title":"Identification of patient name references within medical documents using semantic selectional restrictions","author":"taira","year":"2002","journal-title":"Proc AMIA Symp"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2239641"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516388"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557157"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888906000622"},{"key":"31","first-page":"777","article-title":"A successful technique for removing names in pathology reports using an augmented search and replace method","author":"thomas","year":"2002","journal-title":"Proc AMIA Symp"},{"key":"4","first-page":"1","article-title":"Correlated network data publication via differential privacy","author":"chen","year":"2013","journal-title":"The VLDB Journal"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2288-10-70"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2009.07.006"}],"event":{"name":"2014 6th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2014,3,30]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2014,4,2]]}},"container-title":["2014 6th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6812500\/6813963\/06814045.pdf?arnumber=6814045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T14:48:35Z","timestamp":1648997315000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6814045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ntms.2014.6814045","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}