{"id":"https://openalex.org/W2897087948","doi":"https://doi.org/10.1007/978-3-030-02607-3_28","title":"Privacy Preservation for Re-publication Data by Using Probabilistic Graph","display_name":"Privacy Preservation for Re-publication Data by Using Probabilistic Graph","publication_year":2018,"publication_date":"2018-10-16","ids":{"openalex":"https://openalex.org/W2897087948","doi":"https://doi.org/10.1007/978-3-030-02607-3_28","mag":"2897087948"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-02607-3_28","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-02607-3_28","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067837171","display_name":"Pachara Tinamas","orcid":null},"institutions":[{"id":"https://openalex.org/I48076826","display_name":"Chiang Mai University","ror":"https://ror.org/05m2fqn25","country_code":"TH","type":"education","lineage":["https://openalex.org/I48076826"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Pachara Tinamas","raw_affiliation_strings":["Data Engineering and Network Technology Laboratory, Computer Engineering Department, Faculty of Engineering, Chiang Mai University, Chiang Mai, Thailand"],"affiliations":[{"raw_affiliation_string":"Data Engineering and Network Technology Laboratory, Computer Engineering Department, Faculty of Engineering, Chiang Mai University, Chiang Mai, Thailand","institution_ids":["https://openalex.org/I48076826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081169921","display_name":"Nattapon Harnsamut","orcid":"https://orcid.org/0000-0003-3958-3509"},"institutions":[{"id":"https://openalex.org/I48076826","display_name":"Chiang Mai University","ror":"https://ror.org/05m2fqn25","country_code":"TH","type":"education","lineage":["https://openalex.org/I48076826"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Nattapon Harnsamut","raw_affiliation_strings":["Data Engineering and Network Technology Laboratory, Computer Engineering Department, Faculty of Engineering, Chiang Mai University, Chiang Mai, Thailand"],"affiliations":[{"raw_affiliation_string":"Data Engineering and Network Technology Laboratory, Computer Engineering Department, Faculty of Engineering, Chiang Mai University, Chiang Mai, Thailand","institution_ids":["https://openalex.org/I48076826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018822977","display_name":"Surapon Riyana","orcid":"https://orcid.org/0000-0002-9613-3857"},"institutions":[{"id":"https://openalex.org/I48076826","display_name":"Chiang Mai University","ror":"https://ror.org/05m2fqn25","country_code":"TH","type":"education","lineage":["https://openalex.org/I48076826"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Surapon Riyana","raw_affiliation_strings":["Data Engineering and Network Technology Laboratory, Computer Engineering Department, Faculty of Engineering, Chiang Mai University, Chiang Mai, Thailand"],"affiliations":[{"raw_affiliation_string":"Data Engineering and Network Technology Laboratory, Computer Engineering Department, Faculty of Engineering, Chiang Mai University, Chiang Mai, Thailand","institution_ids":["https://openalex.org/I48076826"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031792027","display_name":"Juggapong Natwichai","orcid":"https://orcid.org/0000-0001-6220-2589"},"institutions":[{"id":"https://openalex.org/I48076826","display_name":"Chiang Mai University","ror":"https://ror.org/05m2fqn25","country_code":"TH","type":"education","lineage":["https://openalex.org/I48076826"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Juggapong Natwichai","raw_affiliation_strings":["Data Engineering and Network Technology Laboratory, Computer Engineering Department, Faculty of Engineering, Chiang Mai University, Chiang Mai, Thailand"],"affiliations":[{"raw_affiliation_string":"Data Engineering and Network Technology Laboratory, Computer Engineering Department, Faculty of Engineering, Chiang Mai University, Chiang Mai, Thailand","institution_ids":["https://openalex.org/I48076826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067837171"],"corresponding_institution_ids":["https://openalex.org/I48076826"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13918558,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"313","last_page":"325"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.827353835105896},{"id":"https://openalex.org/keywords/dynamism","display_name":"Dynamism","score":0.6762266159057617},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.5985810160636902},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5911381244659424},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5855736136436462},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5847936868667603},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.49164658784866333},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4235125184059143},{"id":"https://openalex.org/keywords/data-quality","display_name":"Data quality","score":0.41150620579719543},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.30879485607147217},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21559691429138184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18075355887413025},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.14077863097190857},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.0949525535106659}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.827353835105896},{"id":"https://openalex.org/C2775836275","wikidata":"https://www.wikidata.org/wiki/Q3502310","display_name":"Dynamism","level":2,"score":0.6762266159057617},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.5985810160636902},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5911381244659424},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5855736136436462},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5847936868667603},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.49164658784866333},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4235125184059143},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.41150620579719543},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.30879485607147217},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21559691429138184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18075355887413025},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.14077863097190857},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.0949525535106659},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-02607-3_28","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-02607-3_28","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2090270711","https://openalex.org/W2132678785","https://openalex.org/W2134167315","https://openalex.org/W2159024459","https://openalex.org/W2564948970"],"related_works":["https://openalex.org/W136304283","https://openalex.org/W2602585395","https://openalex.org/W3022534164","https://openalex.org/W4385611918","https://openalex.org/W2564793090","https://openalex.org/W2051608311","https://openalex.org/W2119388874","https://openalex.org/W2380561796","https://openalex.org/W1849704981","https://openalex.org/W2777883117"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
