{"id":"https://openalex.org/W4416599844","doi":"https://doi.org/10.1002/spy2.70129","title":"A Quantum\u2010Resilient and Adaptive Privacy Framework With Anonymization Techniques for Secure Data Mining Operations","display_name":"A Quantum\u2010Resilient and Adaptive Privacy Framework With Anonymization Techniques for Secure Data Mining Operations","publication_year":2025,"publication_date":"2025-11-24","ids":{"openalex":"https://openalex.org/W4416599844","doi":"https://doi.org/10.1002/spy2.70129"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70129","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70129","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108016572","display_name":"N Priya","orcid":null},"institutions":[{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Thanu Priya","raw_affiliation_strings":["Department of IC\u2010Intelligent Computing, SIMATS Engineering Saveetha Institute of Medical and Technical Sciences  Chennai India","Department of IC-Intelligent Computing, SIMATS Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of IC\u2010Intelligent Computing, SIMATS Engineering Saveetha Institute of Medical and Technical Sciences  Chennai India","institution_ids":["https://openalex.org/I85461943"]},{"raw_affiliation_string":"Department of IC-Intelligent Computing, SIMATS Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India","institution_ids":["https://openalex.org/I85461943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091281388","display_name":"V Sheeja Kumari","orcid":"https://orcid.org/0000-0001-5505-0345"},"institutions":[{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"V. Sheeja Kumari","raw_affiliation_strings":["Department of IC\u2010Intelligent Computing, SIMATS Engineering Saveetha Institute of Medical and Technical Sciences  Chennai India","Department of IC-Intelligent Computing, SIMATS Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India"],"raw_orcid":"https://orcid.org/0000-0001-5505-0345","affiliations":[{"raw_affiliation_string":"Department of IC\u2010Intelligent Computing, SIMATS Engineering Saveetha Institute of Medical and Technical Sciences  Chennai India","institution_ids":["https://openalex.org/I85461943"]},{"raw_affiliation_string":"Department of IC-Intelligent Computing, SIMATS Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India","institution_ids":["https://openalex.org/I85461943"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091281388"],"corresponding_institution_ids":["https://openalex.org/I85461943"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":2.1733,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91337652,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5074999928474426,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5074999928474426,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.11079999804496765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.04610000178217888,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6014999747276306},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5934000015258789},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5048999786376953},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4982999861240387},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.4787999987602234},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4749999940395355},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.4729999899864197},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.43529999256134033},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.40790000557899475},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.37929999828338623}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7681999802589417},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6014999747276306},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5934000015258789},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.552299976348877},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5048999786376953},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4982999861240387},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.4787999987602234},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4749999940395355},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.4729999899864197},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.43529999256134033},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.40790000557899475},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.37929999828338623},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.37630000710487366},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3158000111579895},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.30169999599456787},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2992999851703644},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2831000089645386},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28290000557899475},{"id":"https://openalex.org/C164614171","wikidata":"https://www.wikidata.org/wiki/Q5204775","display_name":"DECIPHER","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C197298091","wikidata":"https://www.wikidata.org/wiki/Q5318963","display_name":"Dynamic data","level":2,"score":0.27709999680519104},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.2759000062942505},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.27469998598098755},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2596000134944916},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.25859999656677246},{"id":"https://openalex.org/C72634772","wikidata":"https://www.wikidata.org/wiki/Q386824","display_name":"Data integration","level":2,"score":0.2547000050544739},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2524999976158142},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70129","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70129","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1544333246","https://openalex.org/W1991847410","https://openalex.org/W2005991660","https://openalex.org/W2074873795","https://openalex.org/W2079066680","https://openalex.org/W2081416313","https://openalex.org/W2104083161","https://openalex.org/W2127414816","https://openalex.org/W2153008569","https://openalex.org/W2163605368","https://openalex.org/W2546095675","https://openalex.org/W2555185438","https://openalex.org/W2558896083","https://openalex.org/W2609539869","https://openalex.org/W2971613769","https://openalex.org/W2995310506","https://openalex.org/W3000211734","https://openalex.org/W3024601883","https://openalex.org/W3041036203","https://openalex.org/W3081119885","https://openalex.org/W3105276837","https://openalex.org/W3195369086","https://openalex.org/W4323896447","https://openalex.org/W4389154922","https://openalex.org/W4391901755","https://openalex.org/W4394837290"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"The":[1],"increasing":[2],"reliance":[3],"on":[4,36,240],"data":[5,16,84,133,157,165,185,216,226,258],"mining":[6,85,186,227],"for":[7,250],"extracting":[8],"valuable":[9],"insights":[10],"has":[11],"raised":[12],"significant":[13],"concerns":[14],"about":[15],"security":[17,32],"and":[18,25,46,61,74,81,105,112,149,177,200,233,245,254],"privacy,":[19,80],"especially":[20],"with":[21,163,248],"evolving":[22,125],"cyber":[23,126],"threats":[24],"the":[26,59,90],"advent":[27],"of":[28,93,243],"quantum":[29,44,101],"computing.":[30],"Traditional":[31],"frameworks":[33],"often":[34],"depend":[35],"static":[37],"encryption":[38],"mechanisms":[39],"that":[40,96,191],"are":[41],"vulnerable":[42],"to":[43,49,77,89,169,223],"attacks":[45],"lack":[47],"adaptability":[48],"emerging":[50],"threats.":[51],"To":[52],"address":[53],"these":[54],"limitations,":[55],"this":[56],"research":[57,237],"introduces":[58],"Quantum\u2010Resilient":[60,87],"Adaptive":[62],"Privacy":[63],"(QRAP)":[64],"framework,":[65],"which":[66],"integrates":[67],"Federated":[68],"Learning":[69],"(FL),":[70],"Quantum\u2010Resistant":[71],"Cryptography":[72],"(QRC),":[73],"Anonymization":[75,141],"Techniques":[76,142],"enhance":[78,152],"security,":[79,253],"efficiency":[82],"in":[83,183,197,204,210,256],"operations.":[86,187,259],"refers":[88],"framework's":[91],"integration":[92,247],"cryptographic":[94,120],"protocols":[95],"remain":[97],"secure":[98,113,225],"under":[99],"known":[100],"algorithms":[102],"(e.g.,":[103],"Grover's":[104],"Shor's),":[106],"particularly":[107],"using":[108],"post\u2010quantum":[109],"signature":[110],"schemes":[111],"key":[114],"exchange":[115],"mechanisms.":[116],"QRAP":[117,173,192,244],"dynamically":[118],"updates":[119],"protocols,":[121],"ensuring":[122,161],"resilience":[123],"against":[124],"threats,":[127],"while":[128],"FL":[129],"enables":[130],"secure,":[131],"decentralized":[132,257],"collaboration":[134],"without":[135],"exposing":[136],"raw":[137],"data.":[138],"Additionally,":[139],"advanced":[140],"such":[143],"as":[144],"Differential":[145],"Privacy,":[146],"k\u2010Anonymity,":[147],"l\u2010Diversity,":[148],"t\u2010Closeness":[150],"further":[151],"privacy":[153,198],"by":[154,228],"preventing":[155],"sensitive":[156,212],"from":[158],"being":[159],"re\u2010identified,":[160],"compliance":[162],"stringent":[164],"protection":[166],"regulations.":[167],"Compared":[168],"traditional":[170],"encryption\u2010based":[171],"frameworks,":[172],"offers":[174],"a":[175,194,201,230],"dynamic":[176,215],"quantum\u2010resilient":[178],"approach,":[179],"effectively":[180],"mitigating":[181],"vulnerabilities":[182],"centralized":[184],"Experimental":[188],"results":[189],"demonstrate":[190],"achieves":[193],"35%":[195],"enhancement":[196],"preservation":[199],"28%":[202],"reduction":[203],"computational":[205],"overhead,":[206],"outperforming":[207],"existing":[208],"solutions":[209],"protecting":[211],"information":[213],"within":[214],"environments.":[217],"These":[218],"findings":[219],"underscore":[220],"QRAP's":[221],"potential":[222],"revolutionize":[224],"providing":[229],"scalable,":[231],"privacy\u2010preserving,":[232],"future\u2010proof":[234],"framework.":[235],"Future":[236],"will":[238],"focus":[239],"real\u2010time":[241],"optimization":[242],"its":[246],"blockchain":[249],"enhanced":[251],"transparency,":[252],"trust":[255]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-28T18:21:36.676052","created_date":"2025-11-25T00:00:00"}
