{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:13:48Z","timestamp":1773843228153,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,29]]},"DOI":"10.1109\/scisisis55246.2022.10002081","type":"proceedings-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T13:38:52Z","timestamp":1672839532000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["Privacy preservation satisfying utility requirements based on multi-objective optimization"],"prefix":"10.1109","author":[{"given":"Yuuki","family":"Tachioka","sequence":"first","affiliation":[{"name":"Denso IT Laboratory,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref13","first-page":"239","article-title":"Data Privacy: Foundations","author":"domingo-ferrer","year":"2017","journal-title":"New Developments and the Big Data Challenge"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330701"},{"key":"ref11","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44403-1_7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0428"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"ref4","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Proceedings of ICALP"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref5","first-page":"1037","article-title":"PWS cup 2021 &#x2013; competition on anonymized healthcare data to be qualified for diabetes prevalence study","author":"kikuchi","year":"2021","journal-title":"Computer Security Symposium"}],"event":{"name":"2022 Joint 12th International Conference on Soft Computing and Intelligent Systems and 23rd International Symposium on Advanced Intelligent Systems (SCIS&ISIS)","location":"Ise, Japan","start":{"date-parts":[[2022,11,29]]},"end":{"date-parts":[[2022,12,2]]}},"container-title":["2022 Joint 12th International Conference on Soft Computing and Intelligent Systems and 23rd International Symposium on Advanced Intelligent Systems (SCIS&amp;ISIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10001867\/10001868\/10002081.pdf?arnumber=10002081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T15:14:23Z","timestamp":1675091663000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10002081\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,29]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/scisisis55246.2022.10002081","relation":{},"subject":[],"published":{"date-parts":[[2022,11,29]]}}}