{"id":"https://openalex.org/W1512867724","doi":"https://doi.org/10.1007/978-3-540-78849-2_28","title":"Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets","display_name":"Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets","publication_year":2008,"publication_date":"2008-04-28","ids":{"openalex":"https://openalex.org/W1512867724","doi":"https://doi.org/10.1007/978-3-540-78849-2_28","mag":"1512867724"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-78849-2_28","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-78849-2_28","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056054382","display_name":"Yalong Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]},{"id":"https://openalex.org/I4210110997","display_name":"Ministry of Education","ror":"https://ror.org/01xexqx38","country_code":"ME","type":"government","lineage":["https://openalex.org/I4210110997"]}],"countries":["CN","ME"],"is_corresponding":true,"raw_author_name":"Yalong Dong","raw_affiliation_strings":["Key Laboratory for Information System Security, Ministry of Education,School of Software, Tsinghua University, 100084, Beijing, China","Key Laboratory for Information System Security, Ministry of Education, School of Software, Tsinghua University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Key Laboratory for Information System Security, Ministry of Education,School of Software, Tsinghua University, 100084, Beijing, China","institution_ids":["https://openalex.org/I99065089","https://openalex.org/I4210110997"]},{"raw_affiliation_string":"Key Laboratory for Information System Security, Ministry of Education, School of Software, Tsinghua University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059580144","display_name":"Zude Li","orcid":null},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Zude Li","raw_affiliation_strings":["Computer Science Dept., University Of Western Ontario, London, Ontario, Canada, N6A 5B7","Computer Science Department, University of Western Ontario, London Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Computer Science Dept., University Of Western Ontario, London, Ontario, Canada, N6A 5B7","institution_ids":["https://openalex.org/I125749732"]},{"raw_affiliation_string":"Computer Science Department, University of Western Ontario, London Ontario, Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101655873","display_name":"Xiaojun Ye","orcid":"https://orcid.org/0000-0002-9780-4827"},"institutions":[{"id":"https://openalex.org/I4210110997","display_name":"Ministry of Education","ror":"https://ror.org/01xexqx38","country_code":"ME","type":"government","lineage":["https://openalex.org/I4210110997"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN","ME"],"is_corresponding":false,"raw_author_name":"Xiaojun Ye","raw_affiliation_strings":["Key Laboratory for Information System Security, Ministry of Education,School of Software, Tsinghua University, 100084, Beijing, China","Key Laboratory for Information System Security, Ministry of Education, School of Software, Tsinghua University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Key Laboratory for Information System Security, Ministry of Education,School of Software, Tsinghua University, 100084, Beijing, China","institution_ids":["https://openalex.org/I99065089","https://openalex.org/I4210110997"]},{"raw_affiliation_string":"Key Laboratory for Information System Security, Ministry of Education, School of Software, Tsinghua University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056054382"],"corresponding_institution_ids":["https://openalex.org/I4210110997","https://openalex.org/I99065089"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2788,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53283951,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"263","last_page":"274"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/microdata","display_name":"Microdata (statistics)","score":0.9330315589904785},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7069755792617798},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7056897878646851},{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-anonymity","score":0.7008256316184998},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6616816520690918},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.6005350351333618},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4844129681587219},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.41504934430122375},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3636093735694885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34113630652427673},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15757426619529724},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14625969529151917},{"id":"https://openalex.org/keywords/census","display_name":"Census","score":0.08298090100288391}],"concepts":[{"id":"https://openalex.org/C2778355071","wikidata":"https://www.wikidata.org/wiki/Q1933849","display_name":"Microdata (statistics)","level":4,"score":0.9330315589904785},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7069755792617798},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7056897878646851},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.7008256316184998},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6616816520690918},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.6005350351333618},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4844129681587219},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.41504934430122375},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3636093735694885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34113630652427673},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15757426619529724},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14625969529151917},{"id":"https://openalex.org/C52130261","wikidata":"https://www.wikidata.org/wiki/Q39825","display_name":"Census","level":3,"score":0.08298090100288391},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-78849-2_28","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-78849-2_28","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W56293434","https://openalex.org/W76214014","https://openalex.org/W1545547576","https://openalex.org/W1562453349","https://openalex.org/W1589455111","https://openalex.org/W2052806235","https://openalex.org/W2071776923","https://openalex.org/W2101961306","https://openalex.org/W2119047901","https://openalex.org/W2134167315","https://openalex.org/W2134479759","https://openalex.org/W2135581534","https://openalex.org/W2159024459","https://openalex.org/W2161030490","https://openalex.org/W2358622617","https://openalex.org/W2478892373","https://openalex.org/W2912070442","https://openalex.org/W2912642709","https://openalex.org/W6603104669"],"related_works":["https://openalex.org/W2073216087","https://openalex.org/W2381086482","https://openalex.org/W2327077209","https://openalex.org/W2753525591","https://openalex.org/W2370714061","https://openalex.org/W2969288661","https://openalex.org/W1437029584","https://openalex.org/W2112835772","https://openalex.org/W2240719064","https://openalex.org/W1987545877"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
