{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:18:32Z","timestamp":1764587912998,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,9]],"date-time":"2017-10-09T00:00:00Z","timestamp":1507507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,9]]},"DOI":"10.1145\/3149572.3149586","type":"proceedings-article","created":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T14:54:02Z","timestamp":1513781642000},"page":"120-127","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A comparative study on innovative approaches for privacy-preservation in knowledge discovery"],"prefix":"10.1145","author":[{"given":"Fatemeh","family":"Amiri","sequence":"first","affiliation":[{"name":"University of Vienna, Vienna, Austria"}]},{"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[{"name":"University of Vienna, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2017,10,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Advances in knowledge discovery and data mining","author":"Fayyad U. M.","year":"1996","unstructured":"Fayyad , U. M. , Piatetsky-Shapiro , G. , Smyth , P. and Uthurusamy , R . Advances in knowledge discovery and data mining . AAAI press Menlo Park , 1996 . Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P. and Uthurusamy, R. Advances in knowledge discovery and data mining. AAAI press Menlo Park, 1996."},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE","author":"Narwaria M.","year":"2016","unstructured":"Narwaria , M. and Arya , S . Privacy preserving data mining---'A state of the art '. IEEE , City , 2016 . Narwaria, M. and Arya, S. Privacy preserving data mining---'A state of the art'. IEEE, City, 2016."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994534"},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"Performance Analysis of Clustering Algorithms in Detecting Outliers","volume":"2","author":"Sairam M.","year":"2011","unstructured":"Sairam , M. Sowndarya ,\" Performance Analysis of Clustering Algorithms in Detecting Outliers \". International Journal of Computer Science and Information Technologies , 2 , 1 ( 2011 ), 486--488. Sairam, M. Sowndarya,\" Performance Analysis of Clustering Algorithms in Detecting Outliers\". International Journal of Computer Science and Information Technologies, 2, 1 (2011), 486--488.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2004.06.003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014126"},{"key":"e_1_3_2_1_7_1","volume-title":"Freebies and privacy: What net users think","author":"Westin A.","year":"1999","unstructured":"Westin , A. Freebies and privacy: What net users think ( 1999 ). Westin, A. Freebies and privacy: What net users think (1999)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2012.06.001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2525-9_29"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1269668"},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE","author":"Malik M. B.","year":"2015","unstructured":"Malik , M. B. , Asger , M. , Ali , R. and Sarvar , A . A model for privacy preserving in data mining using Soft Computing techniques . IEEE , City , 2015 . Malik, M. B., Asger, M., Ali, R. and Sarvar, A. A model for privacy preserving in data mining using Soft Computing techniques. IEEE, City, 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-015-1481-x"},{"key":"e_1_3_2_1_16_1","volume-title":"Content analysis: method, applications, and issues. Health care for women international, 13, 3","author":"Downe-Wamboldt B.","year":"1992","unstructured":"Downe-Wamboldt , B. Content analysis: method, applications, and issues. Health care for women international, 13, 3 ( 1992 ), 313--321. Downe-Wamboldt, B. Content analysis: method, applications, and issues. Health care for women international, 13, 3 (1992), 313--321."},{"key":"e_1_3_2_1_17_1","volume-title":"Content analysis: A flexible methodology","author":"White M. D.","year":"2006","unstructured":"White , M. D. and Marsh , E. E . Content analysis: A flexible methodology . Library trends, 55, 1 ( 2006 ), 22--45. White, M. D. and Marsh, E. E. Content analysis: A flexible methodology. Library trends, 55, 1 (2006), 22--45."},{"key":"e_1_3_2_1_18_1","volume-title":"Content analysis in consumer research. Journal of consumer research, 4, 1","author":"Kassarjian H. H.","year":"1977","unstructured":"Kassarjian , H. H. Content analysis in consumer research. Journal of consumer research, 4, 1 ( 1977 ), 8--18. Kassarjian, H. H. Content analysis in consumer research. Journal of consumer research, 4, 1 (1977), 8--18."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2012.15"},{"key":"e_1_3_2_1_20_1","volume-title":"Soft computing for knowledge discovery and data mining","author":"Maimon O.","year":"2007","unstructured":"Maimon , O. and Rokach , L . Soft computing for knowledge discovery and data mining . Springer Science & Business Media , 2007 . Maimon, O. and Rokach, L. Soft computing for knowledge discovery and data mining. Springer Science & Business Media, 2007."},{"key":"e_1_3_2_1_21_1","volume-title":"SRI International","author":"Samarati P.","year":"1998","unstructured":"Samarati , P. and Sweeney , L . Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report , SRI International , 1998 . Samarati, P. and Sweeney, L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International, 1998."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBECS.2010.5462427"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_3_2_1_26_1","volume-title":"Anonymizing tables","author":"Aggarwal G.","year":"2005","unstructured":"Aggarwal , G. , Feder , T. , Kenthapadi , K. , Motwani , R. , Panigrahy , R. , Thomas , D. and Zhu , A . Anonymizing tables . Springer , City , 2005 . Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D. and Zhu, A. Anonymizing tables. Springer, City, 2005."},{"key":"e_1_3_2_1_27_1","volume-title":"ACM","author":"Wong R. C.-W.","year":"2006","unstructured":"Wong , R. C.-W. , Li , J. , Fu , A. W.-C. and Wang , K . (&alpha;, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing . ACM , City , 2006 . Wong, R. C.-W., Li, J., Fu, A. W.-C. and Wang, K. (&alpha;, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. ACM, City, 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.97"},{"key":"e_1_3_2_1_29_1","volume-title":"An Effective K-Anonymity Clustering Method for Minimize Data Privacy Preservation Effec-tiveness in Data Mining Results","author":"El-Rashidy M. A.","year":"2010","unstructured":"El-Rashidy , M. A. , Taha , T. E. , Ayad , N. M. and Sroor , H. S . An Effective K-Anonymity Clustering Method for Minimize Data Privacy Preservation Effec-tiveness in Data Mining Results ( 2010 ). El-Rashidy, M. A., Taha, T. E., Ayad, N. M. and Sroor, H. S. An Effective K-Anonymity Clustering Method for Minimize Data Privacy Preservation Effec-tiveness in Data Mining Results (2010)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.65"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMeCG.2012.14"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732113"},{"key":"e_1_3_2_1_33_1","volume-title":"On random additive perturbation for privacy preserving data mining","author":"Datta S.","year":"2004","unstructured":"Datta , S. On random additive perturbation for privacy preserving data mining . University of Maryland , 2004 . Datta, S. On random additive perturbation for privacy preserving data mining. University of Maryland, 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.14"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03692-2_13"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-004-0173-6"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0135-2_22"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1391239"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2006.155"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0362-4"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2012.166"},{"key":"e_1_3_2_1_43_1","first-page":"2015","author":"Balasubramaniam S.","year":"2015","unstructured":"Balasubramaniam , S. and Kavitha , V . Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing. The Scientific World Journal , 2015 ( 2015 ). Balasubramaniam, S. and Kavitha, V. Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing. The Scientific World Journal, 2015 (2015).","journal-title":"The Scientific World Journal"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700403"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88906-9_32"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.11"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aasri.2013.10.083"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.012"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2362522"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_27"},{"key":"e_1_3_2_1_51_1","volume-title":"City","author":"Jung K.","year":"2014","unstructured":"Jung , K. , Park , S. , Cho , S. and Park , S . A Novel Privacy Preserving Association Rule Mining using Hadoop . City , 2014 . Jung, K., Park, S., Cho, S. and Park, S. A Novel Privacy Preserving Association Rule Mining using Hadoop. City, 2014."},{"key":"e_1_3_2_1_52_1","volume-title":"A survey of association rule hiding methods for privacy. Privacy-Preserving Data Mining","author":"Verykios V. S.","year":"2008","unstructured":"Verykios , V. S. and Gkoulalas-Divanis , A. A survey of association rule hiding methods for privacy. Privacy-Preserving Data Mining ( 2008 ), 267--289. Verykios, V. S. and Gkoulalas-Divanis, A. A survey of association rule hiding methods for privacy. Privacy-Preserving Data Mining (2008), 267--289."},{"key":"e_1_3_2_1_53_1","volume-title":"Privacy Preserving Big Data Mining: Association Rule Hiding. Information Systems & Telecommunication","author":"Afzali G. A.","year":"2016","unstructured":"Afzali , G. A. and Mohammadi , S . Privacy Preserving Big Data Mining: Association Rule Hiding. Information Systems & Telecommunication ( 2016 ), 70. Afzali, G. A. and Mohammadi, S. Privacy Preserving Big Data Mining: Association Rule Hiding. Information Systems & Telecommunication (2016), 70."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2010.1494.1498"},{"key":"e_1_3_2_1_55_1","volume-title":"Hiding sensitive association rules without altering the support of sensitive item (s). Advances in Computer Science and Information Technology. Networks and Communications","author":"Jain D.","year":"2012","unstructured":"Jain , D. , Khatri , P. , Soni , R. and Chaurasia , B. K . Hiding sensitive association rules without altering the support of sensitive item (s). Advances in Computer Science and Information Technology. Networks and Communications ( 2012 ), 500--509. Jain, D., Khatri, P., Soni, R. and Chaurasia, B. K. Hiding sensitive association rules without altering the support of sensitive item (s). Advances in Computer Science and Information Technology. Networks and Communications (2012), 500--509."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijca.2014.7.10.36"},{"key":"e_1_3_2_1_57_1","volume-title":"Privacy-preserving classification of customer data without loss of accuracy","author":"Yang Z.","year":"2005","unstructured":"Yang , Z. , Zhong , S. and Wright , R. N . Privacy-preserving classification of customer data without loss of accuracy . SIAM , City , 2005 . Yang, Z., Zhong, S. and Wright, R. N. Privacy-preserving classification of customer data without loss of accuracy. SIAM, City, 2005."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081913"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.21629\/JSEE.2017.01.19"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774216"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proci.2010.07.014"},{"key":"e_1_3_2_1_62_1","volume-title":"IJEDR","author":"Patel K.","year":"2014","unstructured":"Patel , K. , Patel , H. and Patel , P . Privacy Preserving in Data stream classification using different proposed Perturbation Methods . IJEDR , City , 2014 . Patel, K., Patel, H. and Patel, P. Privacy Preserving in Data stream classification using different proposed Perturbation Methods. IJEDR, City, 2014."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1015"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_74"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345504"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCT.2012.6320768"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.94"},{"key":"e_1_3_2_1_68_1","first-page":"1","article-title":"Fuzzy based approach for privacy preserving publication of data","volume":"8","author":"Kumari V. V.","year":"2008","unstructured":"Kumari , V. V. , Rao , S. S. , Raju , K. , Ramana , K. and Avadhani , B . Fuzzy based approach for privacy preserving publication of data . International Journal of Computer Science and Network Security , 8 , 1 ( 2008 ), 115--121. Kumari, V. V., Rao, S. S., Raju, K., Ramana, K. and Avadhani, B. Fuzzy based approach for privacy preserving publication of data. International Journal of Computer Science and Network Security, 8, 1 (2008), 115--121.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_69_1","volume-title":"Preserving micro data release: Categorical and numerical data. 2009 IEEE SETIT","author":"Poovammal E.","year":"2009","unstructured":"Poovammal , E. and Ponnavaikko , M . Preserving micro data release: Categorical and numerical data. 2009 IEEE SETIT ( 2009 ), 5. Poovammal, E. and Ponnavaikko, M. Preserving micro data release: Categorical and numerical data. 2009 IEEE SETIT (2009), 5."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.68"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905096"},{"key":"e_1_3_2_1_72_1","first-page":"19","volume":"15","author":"Dhanalakshmi S.","year":"2016","unstructured":"Dhanalakshmi , S. , Samath , J. A. and Ahmed , M. I . Model Framework for Sensitive Data Preservation Using Fuzzy. Asian Journal of Information Technology , 15 , 19 ( 2016 ), 3708--3711. Dhanalakshmi, S., Samath, J. A. and Ahmed, M. I. Model Framework for Sensitive Data Preservation Using Fuzzy. Asian Journal of Information Technology, 15, 19 (2016), 3708--3711.","journal-title":"Model Framework for Sensitive Data Preservation Using Fuzzy. Asian Journal of Information Technology"},{"key":"e_1_3_2_1_73_1","volume-title":"A fuzzy based approach for privacy preserving clustering. Journal of Theoretical and applied information Technology, 32, 2","author":"Karthikeyan B.","year":"2011","unstructured":"Karthikeyan , B. , Manikandan , G. and Vaithiyanathan , V . A fuzzy based approach for privacy preserving clustering. Journal of Theoretical and applied information Technology, 32, 2 ( 2011 ), 118--122. Karthikeyan, B., Manikandan, G. and Vaithiyanathan, V. A fuzzy based approach for privacy preserving clustering. Journal of Theoretical and applied information Technology, 32, 2 (2011), 118--122."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2008.4630498"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2013.6622513"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIS.2011.037295"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2012.6250782"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/175247.175255"},{"key":"e_1_3_2_1_79_1","volume-title":"City","author":"Wimmer H.","year":"2014","unstructured":"Wimmer , H. and Powell , L . A Comparison of the Effects of K-Anonymity on Machine Learning Algorithms . City , 2014 . Wimmer, H. and Powell, L. A Comparison of the Effects of K-Anonymity on Machine Learning Algorithms. City, 2014."},{"key":"e_1_3_2_1_80_1","first-page":"10","article-title":"Preserving Privacy and Optimizing Neural Network Classification by using a Mix of Soft Computing Techniques","volume":"147","author":"Malik M. B.","year":"2016","unstructured":"Malik , M. B. , Asger , M. , Ali , R. and Arif , T . Preserving Privacy and Optimizing Neural Network Classification by using a Mix of Soft Computing Techniques . International Journal of Computer Applications , 147 , 10 ( 2016 ). Malik, M. B., Asger, M., Ali, R. and Arif, T. Preserving Privacy and Optimizing Neural Network Classification by using a Mix of Soft Computing Techniques. International Journal of Computer Applications, 147, 10 (2016).","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_81_1","volume-title":"Genetic algorithms and machine learning. Machine learning, 3, 2","author":"Goldberg D. E.","year":"1988","unstructured":"Goldberg , D. E. and Holland , J. H . Genetic algorithms and machine learning. Machine learning, 3, 2 ( 1988 ), 95--99. Goldberg, D. E. and Holland, J. H. Genetic algorithms and machine learning. Machine learning, 3, 2 (1988), 95--99."},{"key":"e_1_3_2_1_82_1","volume-title":"A novel method for privacy preserving in association rule mining based on genetic algorithms. Journal of software, 4, 6","author":"Dehkordi M. N.","year":"2009","unstructured":"Dehkordi , M. N. , Badie , K. and Zadeh , A. K . A novel method for privacy preserving in association rule mining based on genetic algorithms. Journal of software, 4, 6 ( 2009 ), 555--562. Dehkordi, M. N., Badie, K. and Zadeh, A. K. A novel method for privacy preserving in association rule mining based on genetic algorithms. Journal of software, 4, 6 (2009), 555--562."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.03.011"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1343-9"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2013.08.06"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.07.003"},{"key":"e_1_3_2_1_87_1","volume-title":"IEEE","author":"Hong T.-P.","year":"2010","unstructured":"Hong , T.-P. , Yang , K.-T. , Lin , C.-W. and Wang , S . -L. Evolutionary privacy-preserving data mining . IEEE , City , 2010 . Hong, T.-P., Yang, K.-T., Lin, C.-W. and Wang, S.-L. Evolutionary privacy-preserving data mining. IEEE, City, 2010."}],"event":{"name":"ICIME 2017: 2017 9th International Conference on Information Management and Engineering","sponsor":["University of Salford University of Salford"],"location":"Barcelona Spain","acronym":"ICIME 2017"},"container-title":["Proceedings of the 9th International Conference on Information Management and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3149572.3149586","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3149572.3149586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:08Z","timestamp":1750212668000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3149572.3149586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,9]]},"references-count":87,"alternative-id":["10.1145\/3149572.3149586","10.1145\/3149572"],"URL":"https:\/\/doi.org\/10.1145\/3149572.3149586","relation":{},"subject":[],"published":{"date-parts":[[2017,10,9]]},"assertion":[{"value":"2017-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}