{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:44:56Z","timestamp":1777016696281,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,17]]},"DOI":"10.1145\/3799830.3799831","type":"proceedings-article","created":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:45:08Z","timestamp":1777013108000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["(\u2113, \u03b4)-Diversity: Linkage-Robustness via a Composition Theorem"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5284-215X","authenticated-orcid":false,"given":"V Arvind","family":"Rameshwar","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8405-4433","authenticated-orcid":false,"given":"Anshoo","family":"Tandon","sequence":"additional","affiliation":[{"name":"Centre of Data for Public Good, Bengaluru, India"}]}],"member":"320","published-online":{"date-parts":[[2026,4,23]]},"reference":[{"key":"e_1_3_3_2_2_2","first-page":"246","volume-title":"Database Theory - ICDT 2005","author":"Aggarwal Gagan","year":"2005","unstructured":"Gagan Aggarwal, Tom\u00e1s Feder, Krishnaram Kenthapadi, Rajeev Motwani, Rina Panigrahy, Dilys Thomas, and An Zhu. 2005. Anonymizing Tables. In Database Theory - ICDT 2005, Thomas Eiter and Leonid Libkin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 246\u2013258."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134 (2014) 211\u2013407. 10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"Nils Homer Szabolcs Szelinger David\u00a0Duggan Margot\u00a0Redman Waibhav Tembe Jill Muehling John\u00a0V. Pearson Dietrich\u00a0A. Stephan Stanley\u00a0F. Nelson and David\u00a0W. Craig. 2008. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays. PLoS Genetics 4(8) 25 (2008). 10.1371\/journal.pgen.1000167","DOI":"10.1371\/journal.pgen.1000167"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414474"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78478-4_4"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Ashwin Machanavajjhala Daniel Kifer Johannes Gehrke and Muthuramakrishnan Venkitasubramaniam. 2007. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1 1 (March 2007) 3\u2013es. 10.1145\/1217299.1217302","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_3_3_2_13_2","unstructured":"Rajeev Motwani and Shubha\u00a0U. Nabar. 2008. Anonymizing Unstructured Data. arXiv:https:\/\/arXiv.org\/abs\/0810.5582\u00a0[cs.DB] https:\/\/arxiv.org\/abs\/0810.5582"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_3_2_15_2","volume-title":"General Election to Loksabha 2024 - Statistical Reports","author":"India Election\u00a0Commission of","year":"2025","unstructured":"Election\u00a0Commission of India. 2025. General Election to Loksabha 2024 - Statistical Reports. https:\/\/www.eci.gov.in\/general-election-to-loksabha-2024-statistical-reports"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247490"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"P. Samarati. 2001. Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13 6 (2001) 1010\u20131027. 10.1109\/69.971193","DOI":"10.1109\/69.971193"},{"key":"e_1_3_3_2_18_2","volume-title":"Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression","author":"Samarati P.","year":"1998","unstructured":"P. Samarati and L. Sweeney. 1998. Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. Technical Report. http:\/\/www.csl.sri.com\/papers\/sritr-98-04\/"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Latanya Sweeney. 1997. Weaving technology and policy together to maintain confidentiality. Journal of Law Medicine & Ethics 25 2\u20133 (1997) 98\u2013110. 10.1111\/j.1748-720x.1997.tb01885.x","DOI":"10.1111\/j.1748-720x.1997.tb01885.x"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"L. Sweeney. 2002. k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems 10 05 (2002) 557\u2013570. 10.1142\/S0218488502001648 arXiv:10.1142\/S0218488502001648","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_7"},{"key":"e_1_3_3_2_22_2","volume-title":"FOILing NYC\u2019s Taxi Trip Data","author":"Whong C.","year":"2014","unstructured":"C. Whong. 2014. FOILing NYC\u2019s Taxi Trip Data. https:\/\/chriswhong.com\/open-data\/foil_nyc_taxi\/"}],"event":{"name":"CODS 2025: 13th ACM IKDD International Conference on Data Science","location":"Pune India","acronym":"CODS 2025"},"container-title":["Proceedings of the 13th ACM IKDD International Conference on Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3799830.3799831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:14:08Z","timestamp":1777014848000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3799830.3799831"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,17]]},"references-count":21,"alternative-id":["10.1145\/3799830.3799831","10.1145\/3799830"],"URL":"https:\/\/doi.org\/10.1145\/3799830.3799831","relation":{},"subject":[],"published":{"date-parts":[[2025,12,17]]},"assertion":[{"value":"2026-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}