{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:40:10Z","timestamp":1756237210375,"version":"3.44.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,11,1]],"date-time":"2012-11-01T00:00:00Z","timestamp":1351728000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,11,1]],"date-time":"2012-11-01T00:00:00Z","timestamp":1351728000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/scis-isis.2012.6505046","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T19:28:32Z","timestamp":1367004512000},"page":"1119-1124","source":"Crossref","is-referenced-by-count":2,"title":["Electronic Medical Records privacy preservation through k-anonymity clustering method"],"prefix":"10.1109","author":[{"given":"Moonshik","family":"Shin","sequence":"first","affiliation":[{"name":"Department of Bio and Brain Engineering, KAIST 291 Gwahakro, Yuseong-gu, Dajeon, 305-701, Korea"}]},{"given":"Sunyong","family":"Yoo","sequence":"additional","affiliation":[{"name":"Department of Bio and Brain Engineering, KAIST 291 Gwahakro, Yuseong-gu, Dajeon, 305-701, Korea"}]},{"given":"Kwang H.","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Bio and Brain Engineering, KAIST 291 Gwahakro, Yuseong-gu, Dajeon, 305-701, Korea"}]},{"given":"Doheon","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Bio and Brain Engineering, KAIST 291 Gwahakro, Yuseong-gu, Dajeon, 305-701, Korea"}]}],"member":"263","reference":[{"key":"13","first-page":"55","author":"blake","year":"1998","journal-title":"UCI repository of machine learning databases"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2010.03.006"},{"key":"12","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-3-540-73871-8_10","article-title":"A k-anonymity clustering method for effective data privacy preservation","author":"chiu","year":"2007","journal-title":"Advanced Data Mining and Applications"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2288-10-70"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-8-32"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71703-4_18"},{"key":"5","first-page":"217","author":"bayardo","year":"2005","journal-title":"Data Privacy Through Optimal K-anonymization"},{"key":"4","first-page":"106","author":"li","year":"2007","journal-title":"Tcloseness Privacy beyond K-anonymity and Ldiversity"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"}],"event":{"name":"2012 Joint 6th Intl. Conference on Soft Computing and Intelligent Systems (SCIS) and 13th Intl. Symposium on Advanced Intelligent Systems (ISIS)","start":{"date-parts":[[2012,11,20]]},"location":"Kobe, Japan","end":{"date-parts":[[2012,11,24]]}},"container-title":["The 6th International Conference on Soft Computing and Intelligent Systems, and The 13th International Symposium on Advanced Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6495582\/6504994\/06505046.pdf?arnumber=6505046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:06:51Z","timestamp":1756235211000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6505046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/scis-isis.2012.6505046","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}