{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:54:04Z","timestamp":1757454844079,"version":"3.41.0"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000002","name":"NIH","doi-asserted-by":"publisher","award":["R01-LM011366","R01-HG006844","R01-LM009989","U01-HG006478","U01-HG006385"],"award-info":[{"award-number":["R01-LM011366","R01-HG006844","R01-LM009989","U01-HG006478","U01-HG006385"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-0424422"],"award-info":[{"award-number":["CCF-0424422"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"AFRL","doi-asserted-by":"publisher","award":["FA8785-14-2-0180"],"award-info":[{"award-number":["FA8785-14-2-0180"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"ONR","doi-asserted-by":"publisher","award":["N00014-15-1-2621"],"award-info":[{"award-number":["N00014-15-1-2621"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"ARO","doi-asserted-by":"publisher","award":["W911NF-16-1-0069"],"award-info":[{"award-number":["W911NF-16-1-0069"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["IIS-1526860"],"award-info":[{"award-number":["IIS-1526860"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sandia National Labs","award":["2191"],"award-info":[{"award-number":["2191"]}]},{"name":"Symantec Labs Graduate Research Fellowship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2017,3,1]]},"DOI":"10.1109\/tkde.2016.2628180","type":"journal-article","created":{"date-parts":[[2016,11,11]],"date-time":"2016-11-11T22:03:28Z","timestamp":1478901808000},"page":"698-711","source":"Crossref","is-referenced-by-count":9,"title":["Scalable Iterative Classification for Sanitizing Large-Scale Datasets"],"prefix":"10.1109","volume":"29","author":[{"given":"Bo","family":"Li","sequence":"first","affiliation":[]},{"given":"Yevgeniy","family":"Vorobeychik","sequence":"additional","affiliation":[]},{"given":"Muqun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bradley","family":"Malin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2441"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.353"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150449"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150435"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2514689"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588581"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458194"},{"key":"ref36","article-title":"Replacing personally-identifying information in medical records, the scrub system","author":"sweeney","year":"0","journal-title":"Proc AMIA Fall Symp"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-6-12"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367857"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.11.005"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3115\/1220575.1220631"},{"journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction","year":"2011","author":"hastie","key":"ref61"},{"key":"ref63","first-page":"361","article-title":"RCV1: A new benchmark collection for text categorization research","volume":"5","author":"lewis","year":"2004","journal-title":"J Mach Learn Res"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"ref64","first-page":"259","article-title":"Recognizing medication related entities in hospital discharge summaries using support vector machine","author":"doan","year":"0","journal-title":"Proc Int Conf Comput Linguistics Posters"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/290941.290996"},{"key":"ref66","article-title":"Detecting and reading text in natural scenes","volume":"2","author":"chen","year":"0","journal-title":"Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"ref2","first-page":"82462","article-title":"Standards for privacy and individually identifiable health information; final rule","volume":"65","year":"2000","journal-title":"Federal Register"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.06.007"},{"key":"ref22","article-title":"A face is exposed for AOL searcher no. ****4417749","volume":"9","author":"barbaro","year":"2008","journal-title":"New York Times"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3414\/ME15-01-0122"},{"key":"ref24","article-title":"Anonymisation: Managing data protection risk code of practice","author":"graham","year":"2012","journal-title":"Information Commissioner's Office"},{"key":"ref23","article-title":"Jeb Bush exposed 13,000 social security numbers: Here&#x2019;s where they were hiding","author":"hackett","year":"2015","journal-title":"Forbes"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1080\/07350015.1992.10509909","article-title":"The privacy bootstrap","volume":"10","author":"bowden","year":"1992","journal-title":"J Business Economic Statist"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.11"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0120592"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029203"},{"key":"ref58","first-page":"3","article-title":"Record linkage, privacy and statistical policy","volume":"4","author":"cox","year":"1988","journal-title":"J Official Statist"},{"key":"ref57","first-page":"485","article-title":"Optimal randomized classification in adversarial settings","author":"vorobeychik","year":"0","journal-title":"Proc Int Joint Conf Auton Agents Multiagent Syst"},{"key":"ref56","article-title":"Scalable optimization of randomized operational decisions in adversarial classification settings","author":"li","year":"0","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref55","first-page":"2087","article-title":"Feature cross-substitution in adversarial classification","author":"li","year":"0","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0197-3"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020495"},{"key":"ref10","first-page":"620","article-title":"SECRETA: A system for evaluating and comparing relational and transaction anonymization algorithms","author":"poulis","year":"0","journal-title":"Proc Int Conf Extending Database Technol"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_23"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2007.10.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453874"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2011-000464"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.09.007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-12-S3-S2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401997"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516491"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-001020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2444"},{"key":"ref4","first-page":"31","article-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","volume":"281","year":"1995","journal-title":"Official J EC"},{"year":"2014","key":"ref3","article-title":"Federal rules of civil procedure"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref49","first-page":"895","article-title":"Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games","author":"paruchuri","year":"0","journal-title":"Proc 1st Int Conf Autonomous Agents Multiagent Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687733"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2014.03.006"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2016.03.019"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1100.0505"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.06.029"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.06.009"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-001034"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.06.015"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/69\/7842711\/7742323-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/7842711\/07742323.pdf?arnumber=7742323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T11:51:14Z","timestamp":1749729074000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7742323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,1]]},"references-count":66,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2016.2628180","relation":{},"ISSN":["1041-4347"],"issn-type":[{"type":"print","value":"1041-4347"}],"subject":[],"published":{"date-parts":[[2017,3,1]]}}}