{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:44:17Z","timestamp":1775695457311,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/tifs.2017.2656458","type":"journal-article","created":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T20:21:29Z","timestamp":1484943689000},"page":"1156-1169","source":"Crossref","is-referenced-by-count":5,"title":["Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6299-8441","authenticated-orcid":false,"given":"Rajiv","family":"Bagai","sequence":"first","affiliation":[]},{"given":"Nafia","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"kapur","year":"2009","journal-title":"Maximum Entropy Models in Science and Engineering"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","article-title":"Towards measuring anonymity","volume":"2482","author":"diaz","year":"2002","journal-title":"Proc Privacy Enhancing Technol Workshop"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511529979"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0001-8708(81)90044-X"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.81"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2252618"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","article-title":"Towards an information theoretic metric for anonymity","volume":"2482","author":"serjantov","year":"2002","journal-title":"Proc Privacy Enhancing Technol Workshop"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s004930070007"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(94)00188-X"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1967.21.343"},{"key":"ref28","first-page":"1040","article-title":"Structural data deanony-mization: Quantification, practice, and implications","author":"ji","year":"2014","journal-title":"Proc 21st ACM Conf Comput Commun Secur (CCS)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247177"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"ref2","first-page":"24","article-title":"$\\ell $ -diversity: Privacy beyond k-anonymity","author":"machanavajjhala","year":"2006","journal-title":"Proc IEEE Int Conf on Data Engineering (ICDE)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379497"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1409620.1409623"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(79)90044-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511984068"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066165"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536467"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221855"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456422"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557157"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"ref10","first-page":"190","article-title":"A legal evaluation of pseudonymization approaches","volume":"2","author":"neubauer","year":"2009","journal-title":"International Journal on Advances in Security"},{"key":"ref11","author":"abouakil","year":"2009","journal-title":"Pseudonymization of Medical Images Development and Implementation of a Method for the Pseudonymized Processing of DICOM Images"},{"key":"ref40","volume":"6","author":"minc","year":"1978","journal-title":"Permanents 006 Encyclopedia of Mathematics and Its Applications"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221854"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314346"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.6519618"},{"key":"ref17","year":"2006","journal-title":"AOL Search Data"},{"key":"ref18","first-page":"111","article-title":"Robust de-anonymization of large sparse datasets","author":"narayanan","year":"2008","journal-title":"Proc IEEE Symp Secur Privacy (SP)"},{"key":"ref19","year":"2006","journal-title":"Netflix Prize"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref6","author":"fung","year":"2011","journal-title":"Introduction to Privacy-Preserving Data Publishing Concepts and Techniques"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1561\/1900000008"},{"key":"ref8","article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management","author":"pfitzmann","year":"2010"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-70992-5","author":"aggarwal","year":"2008","journal-title":"Privacy-preserving Data Mining Models and Algorithms"},{"key":"ref49","first-page":"35","article-title":"Practicing differential privacy in health care: A review","volume":"6","author":"dankar","year":"2013","journal-title":"Trans Data Privacy"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/0470083980"},{"key":"ref46","first-page":"171","article-title":"A survey of forecast error measures","volume":"24","author":"shcherbakov","year":"2013","journal-title":"World Appl Sci J"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2006.03.001"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming"},{"key":"ref47","first-page":"2790","article-title":"Short-term wind power forecasting using Gaussian processes","author":"chen","year":"2013","journal-title":"Proc Intern Joint Conf Artificial Intel (IJCAI)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(03)00010-2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/BF01940871"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-306-47630-3"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008738"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7862329\/07828115.pdf?arnumber=7828115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:27:00Z","timestamp":1642004820000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7828115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":55,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2656458","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5]]}}}