{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:23:05Z","timestamp":1730319785743,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T00:00:00Z","timestamp":1524441600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,23]]},"DOI":"10.1145\/3195258.3195261","type":"proceedings-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T08:12:32Z","timestamp":1522656752000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An Information-Theoretic Approach to Time-Series Data Privacy"],"prefix":"10.1145","author":[{"given":"Yousef","family":"Amar","sequence":"first","affiliation":[{"name":"Queen Mary University of London"}]},{"given":"Hamed","family":"Haddadi","sequence":"additional","affiliation":[{"name":"Imperial College London"}]},{"given":"Richard","family":"Mortier","sequence":"additional","affiliation":[{"name":"University of Cambridge"}]}],"member":"320","published-online":{"date-parts":[[2018,4,23]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/2702123.2702210"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1754239.1754272"},{"key":"e_1_3_2_1_3_1","first-page":"3","article-title":"An information theoretic approach for privacy metrics","volume":"3","author":"Bezzi M","year":"2010","journal-title":"Trans. Data Privacy"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.14722\/ndss.2014.23212"},{"key":"e_1_3_2_1_5_1","first-page":"143","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Chakraborty S.","year":"2014"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.ic.2007.07.003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.7146\/aahcc.v1i1.21312"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/978-3-642-39077-7_12"},{"volume-title":"Finding a needle in a haystack or identifying anonymous census records. Journal of official statistics 2, 3","year":"1986","author":"Dalenius T.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Proceedings of the International Conference on Information and Knowledge Engineering (IKE)","author":"Greveler U.","year":"2012"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/978-3-642-04898-2_327"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/SmartGridComm.2011.6102313"},{"unstructured":"Kolter J. Z. and Johnson M. J. Redd: A public data set for energy disaggregation research. Kolter J. Z. and Johnson M. J. Redd: A public data set for energy disaggregation research.","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/ICDE.2007.367856"},{"volume-title":"UCI machine learning repository","year":"2013","author":"Lichman M.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/ICDE.2006.1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/SP.2008.33"},{"volume-title":"Simple demographics often identify people uniquely. Health (San Francisco) 671","year":"2000","author":"Sweeney L.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1142\/S0218488502001648"},{"volume-title":"Technical privacy metrics: a systematic survey. arXiv preprint arXiv:1512.00327","year":"2015","author":"Wagner I.","key":"e_1_3_2_1_22_1"}],"event":{"sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"acronym":"EuroSys '18","name":"EuroSys '18: Thirteenth EuroSys Conference 2018","location":"Porto Portugal"},"container-title":["Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3195258.3195261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T22:07:59Z","timestamp":1673474879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3195258.3195261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,23]]},"references-count":22,"alternative-id":["10.1145\/3195258.3195261","10.1145\/3195258"],"URL":"https:\/\/doi.org\/10.1145\/3195258.3195261","relation":{},"subject":[],"published":{"date-parts":[[2018,4,23]]},"assertion":[{"value":"2018-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}