{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:40:21Z","timestamp":1775018421958,"version":"3.50.1"},"reference-count":22,"publisher":"Pleiades Publishing Ltd","issue":"5","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1134\/s036176882305002x","type":"journal-article","created":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T04:55:24Z","timestamp":1696827324000},"page":"388-400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Application of Computer Simulation to the Anonymization of Personal Data: Synthesis-Based Anonymization Model and Algorithm"],"prefix":"10.1134","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3124-2147","authenticated-orcid":false,"given":"A. V.","family":"Borisov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7163-341X","authenticated-orcid":false,"given":"A. V.","family":"Bosov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7811-7645","authenticated-orcid":false,"given":"A. V.","family":"Ivanov","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2023,10,9]]},"reference":[{"key":"3753_CR1","doi-asserted-by":"crossref","unstructured":"Borisov, A.V., Bosov, A.V., and Ivanov, A.V., Application of Computer Simulation to the Anonymization of Personal Data: State-of-the-Art and Key Points, Program. Comput. Software, 2023, no. 4, pp. 232\u2013246.","DOI":"10.1134\/S0361768823040047"},{"key":"3753_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C. and Yu, P.S., On privacy-preservation of text and sparse binary data with sketches, Proc. SIAM Conf. Data Mining, 2007.","DOI":"10.1137\/1.9781611972771.6"},{"key":"3753_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L., K-anonymity: A model for protecting privacy, Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., 2002, vol. 10, no. 5, pp. 557\u2013570.","journal-title":"Int. J. Uncertainty, Fuzziness Knowl.-Based Syst."},{"key":"3753_CR4","doi-asserted-by":"crossref","unstructured":"Samarati, P. and Sweeney, L., Generalizing data to provide anonymity when disclosing information (Abstract), Proc. ACM Symp. Principles of Database Systems, 1998, p. 188.","DOI":"10.1145\/275487.275508"},{"key":"3753_CR5","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., Protecting respondents' identities in microdata release, IEEE Trans. Knowl. Data Eng., 2001, vol. 13, no. 6, pp. 1010\u20131027.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3753_CR6","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J. and Agrawal, R., Data privacy through optimal k-anonymization, Proc. ICDE Conf., 2005, pp.\u00a0217\u2013228.","DOI":"10.1109\/ICDE.2005.42"},{"key":"3753_CR7","unstructured":"Fung, B., Wang, K., and Yu, P., Top-down specialization for information and privacy preservation, Proc. ICDE Conf., 2005."},{"key":"3753_CR8","unstructured":"Wang, K., Yu, P., and Chakraborty, S., Bottom-up generalization: A data mining solution to privacy protection, Proc. ICDM Conf., 2004."},{"key":"3753_CR9","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J. and Mateo-Sanz, J., Practical data-oriented micro-aggregation for statistical disclosure control, IEEE TKDE, 2002, vol. 14, no. 1.","DOI":"10.1109\/69.979982"},{"key":"3753_CR10","unstructured":"Winkler, W., Using simulated annealing for k-anonymity, Technical Report 7, US Census Bureau, Washington D.C. 20233, 2002."},{"key":"3753_CR11","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S., Transforming data to satisfy privacy constraints, Proc. KDD Conference, 2002.","DOI":"10.1145\/775088.775089"},{"key":"3753_CR12","doi-asserted-by":"crossref","unstructured":"Lakshmanan, L., Ng, R., and Ramesh, G., To do or not to do: The dilemma of disclosing anonymized data, Proc. ACM SIGMOD Conf., 2005.","DOI":"10.1145\/1066157.1066165"},{"key":"3753_CR13","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C. and Yu, P.S., On variable constraints in privacy-preserving data mining, Proc. SIAM Conf., 2005.","DOI":"10.1137\/1.9781611972757.11"},{"key":"3753_CR14","unstructured":"Aggarwal, C.C., On k-anonymity and the curse of dimensionality, Proc. VLDB Conf., 2005."},{"key":"3753_CR15","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S., Transforming data to satisfy privacy constraints, Proc. KDD Conf., 2002.","DOI":"10.1145\/775088.775089"},{"key":"3753_CR16","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M., L-Diversity: Privacy beyond k\u2011anonymity, Proc. ICDE Conf., 2006.","DOI":"10.1109\/ICDE.2006.1"},{"key":"3753_CR17","unstructured":"Fung, B., Wang, K., and Yu, P., Top-down specialization for information and privacy preservation, Proc. ICDE Conf., 2005."},{"key":"3753_CR18","unstructured":"Wang, K., Yu, P., and Chakraborty, S., Bottom-up generalization: A data mining solution to privacy protection, Proc. ICDM Conf., 2004."},{"key":"3753_CR19","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1214\/aoms\/1177728190","volume":"27","author":"M. Rosenblatt","year":"1956","unstructured":"Rosenblatt, M., Remarks on some nonparametric estimates of a density function, Ann. Math. Stat., 1956, vol.\u00a027, no. 3, pp. 832\u2013837.","journal-title":"Ann. Math. Stat."},{"key":"3753_CR20","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1214\/aoms\/1177704472","volume":"33","author":"E. Parzen","year":"1962","unstructured":"Parzen, E., On estimation of a probability density function and mode, Ann. Math. Stat., 1962, vol. 33, no. 3, pp. 1065\u20131076.","journal-title":"Ann. Math. Stat."},{"key":"3753_CR21","volume-title":"Density Estimation for Statistics and Data Analysis","author":"B.W. Silverman","year":"1986","unstructured":"Silverman, B.W., Density Estimation for Statistics and Data Analysis, London: Chapman & Hall\/CRC, 1986."},{"key":"3753_CR22","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S. Kullback","year":"1951","unstructured":"Kullback, S. and Leibler, R.A., On information and sufficiency, Ann. Math. Stat., 1951, vol. 22, no. 1, pp.\u00a079\u201386.","journal-title":"Ann. Math. Stat."}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S036176882305002X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S036176882305002X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S036176882305002X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:52:23Z","timestamp":1775011943000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S036176882305002X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["3753"],"URL":"https:\/\/doi.org\/10.1134\/s036176882305002x","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10]]},"assertion":[{"value":"14 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}