{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:44Z","timestamp":1750220324303,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T00:00:00Z","timestamp":1640131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,22]]},"DOI":"10.1145\/3508546.3508635","type":"proceedings-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T11:53:44Z","timestamp":1645790024000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Free Text Dataset for Hiding Quasi-Identifiers"],"prefix":"10.1145","author":[{"given":"Dunbo","family":"Cai","sequence":"first","affiliation":[{"name":"Center for Technology Research &amp; Innovation, China Mobile (Suzhou) Software Technology Co., Ltd., China"}]},{"given":"Ling","family":"Qian","sequence":"additional","affiliation":[{"name":"Center for Technology Research &amp; Innovation, China Mobile (Suzhou) Software Technology Co., Ltd., China"}]},{"given":"Dongqin","family":"Xu","sequence":"additional","affiliation":[{"name":"Center for Technology Research &amp; Innovation, China Mobile (Suzhou) Software Technology Co., Ltd., China"}]},{"given":"Zhiguo","family":"Huang","sequence":"additional","affiliation":[{"name":"Center for Technology Research &amp; Innovation, China Mobile (Suzhou) Software Technology Co., Ltd., China"}]}],"member":"320","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"El Emam Khaled and Fida Kamal Dankar. 2008. Protecting privacy using k-anonymity.\u00a0Journal of the American Medical Informatics Association \u00a015 5 627-637.  El Emam Khaled and Fida Kamal Dankar. 2008. Protecting privacy using k-anonymity.\u00a0Journal of the American Medical Informatics Association \u00a015 5 627-637.","DOI":"10.1197\/jamia.M2716"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Sweeney Latanya. 2002. k-anonymity: A model for protecting privacy.\u00a0International Journal of Uncertainty Fuzziness and Knowledge-Based Systems \u00a010 05 557-570.  Sweeney Latanya. 2002. k-anonymity: A model for protecting privacy.\u00a0International Journal of Uncertainty Fuzziness and Knowledge-Based Systems \u00a010 05 557-570.","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of International Conference on Privacy in Statistical Databases.\u00a0Springer, Cham, 121-135","author":"Molnar David","year":"2020","unstructured":"\u0160ar\u010devi\u0107, Tanja, David Molnar , and Rudolf Mayer . 2020 . An Analysis of Different Notions of Effectiveness in k-Anonymity . In Proceedings of International Conference on Privacy in Statistical Databases.\u00a0Springer, Cham, 121-135 . \u0160ar\u010devi\u0107, Tanja, David Molnar, and Rudolf Mayer. 2020. An Analysis of Different Notions of Effectiveness in k-Anonymity. In Proceedings of International Conference on Privacy in Statistical Databases.\u00a0Springer, Cham, 121-135."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Machanavajjhala Ashwin Daniel Kifer Johannes Gehrke and Muthuramakrishnan Venkitasubramaniam. 2007. l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD) 1 1 3-es.  Machanavajjhala Ashwin Daniel Kifer Johannes Gehrke and Muthuramakrishnan Venkitasubramaniam. 2007. l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD) 1 1 3-es.","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_5_1","volume-title":"Studying L-Diversity and K-Anonymity Over Datasets with Sensitive Fields. In\u00a0Proceedings of the International Conference on Artificial Intelligence and Security. Springer, Cham, 63-73","author":"Seigneur Franck","year":"2019","unstructured":"Nininahazwe, Franck Seigneur . 2019 . Studying L-Diversity and K-Anonymity Over Datasets with Sensitive Fields. In\u00a0Proceedings of the International Conference on Artificial Intelligence and Security. Springer, Cham, 63-73 . Nininahazwe, Franck Seigneur. 2019. Studying L-Diversity and K-Anonymity Over Datasets with Sensitive Fields. In\u00a0Proceedings of the International Conference on Artificial Intelligence and Security. Springer, Cham, 63-73."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Neamatullah Ishna Margaret M. Douglass H. Lehman Li-wei Andrew Reisner Mauricio Villarroel William J. Long Peter Szolovits George B. Moody Roger G. Mark and Gari D. 2008. Automated de-identification of free-text medical records. BMC medical informatics and decision making 8 1 1-17.  Neamatullah Ishna Margaret M. Douglass H. Lehman Li-wei Andrew Reisner Mauricio Villarroel William J. Long Peter Szolovits George B. Moody Roger G. Mark and Gari D. 2008. Automated de-identification of free-text medical records. BMC medical informatics and decision making 8 1 1-17.","DOI":"10.1186\/1472-6947-8-32"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.07.032"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2017.05.023"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2020.1718343"},{"key":"e_1_3_2_1_10_1","first-page":"1753","volume-title":"Proceedings of the 2015 conference on empirical methods in natural language processing. Association for Computational Linguistics","author":"Liu Kang","year":"2015","unstructured":"Zeng, Daojian, Kang Liu , Yubo Chen , and Jun Zhao . 2015 . Distant supervision for relation extraction via piecewise convolutional neural networks . In Proceedings of the 2015 conference on empirical methods in natural language processing. Association for Computational Linguistics , Lisbon, Portugal , 1753 - 1762 . Zeng, Daojian, Kang Liu, Yubo Chen, and Jun Zhao. 2015. Distant supervision for relation extraction via piecewise convolutional neural networks. In Proceedings of the 2015 conference on empirical methods in natural language processing. Association for Computational Linguistics, Lisbon, Portugal, 1753-1762."},{"key":"e_1_3_2_1_11_1","first-page":"4881","volume-title":"Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18)","author":"Wang Kexiang","year":"2018","unstructured":"Liu, Tianyu, Kexiang Wang , Lei Sha , Baobao Chang , and Zhifang Sui . 2018 . Table-to-text generation by structure-aware seq2seq learning . In Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18) .AAAI Press, New Orleans, Louisiana, USA , 4881 - 4888 . Liu, Tianyu, Kexiang Wang, Lei Sha, Baobao Chang, and Zhifang Sui. 2018. Table-to-text generation by structure-aware seq2seq learning. In Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18).AAAI Press, New Orleans, Louisiana, USA, 4881-4888."},{"key":"e_1_3_2_1_12_1","first-page":"6908","volume-title":"Proceedings of the Thirty-Third AAAI conference on artificial intelligence (AAAI-19)","author":"Dong Li","year":"2019","unstructured":"Puduppully, Ratish, Li Dong , and Mirella Lapata . 2019 . Data-to-text generation with content selection and planning . In Proceedings of the Thirty-Third AAAI conference on artificial intelligence (AAAI-19) .AAAI Press, Hawai, USA, 33, 01 , 6908 - 6915 . Puduppully, Ratish, Li Dong, and Mirella Lapata. 2019. Data-to-text generation with content selection and planning. In Proceedings of the Thirty-Third AAAI conference on artificial intelligence (AAAI-19).AAAI Press, Hawai, USA, 33, 01, 6908-6915."},{"key":"e_1_3_2_1_13_1","unstructured":"[Online]. Available: http:\/\/archive.ics.uci.edu\/ml\/datasets.php.  [Online]. Available: http:\/\/archive.ics.uci.edu\/ml\/datasets.php."}],"event":{"name":"ACAI'21: 2021 4th International Conference on Algorithms, Computing and Artificial Intelligence","acronym":"ACAI'21","location":"Sanya China"},"container-title":["2021 4th International Conference on Algorithms, Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508546.3508635","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508546.3508635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:04Z","timestamp":1750191124000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508546.3508635"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,22]]},"references-count":13,"alternative-id":["10.1145\/3508546.3508635","10.1145\/3508546"],"URL":"https:\/\/doi.org\/10.1145\/3508546.3508635","relation":{},"subject":[],"published":{"date-parts":[[2021,12,22]]},"assertion":[{"value":"2022-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}