{"id":"https://openalex.org/W4417268333","doi":"https://doi.org/10.1007/s00500-025-10948-7","title":"Fuzzy clustering-based microaggregation for multi-view data with constraints","display_name":"Fuzzy clustering-based microaggregation for multi-view data with constraints","publication_year":2025,"publication_date":"2025-12-12","ids":{"openalex":"https://openalex.org/W4417268333","doi":"https://doi.org/10.1007/s00500-025-10948-7"},"language":"en","primary_location":{"id":"doi:10.1007/s00500-025-10948-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00500-025-10948-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00500-025-10948-7.pdf","source":{"id":"https://openalex.org/S65753830","display_name":"Soft Computing","issn_l":"1432-7643","issn":["1432-7643","1433-7479"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s00500-025-10948-7.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102789328","display_name":"Fatemeh Sadjadi","orcid":"https://orcid.org/0000-0001-5116-9971"},"institutions":[{"id":"https://openalex.org/I90267481","display_name":"Ume\u00e5 University","ror":"https://ror.org/05kb8h459","country_code":"SE","type":"education","lineage":["https://openalex.org/I90267481"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Fatemeh Sadjadi","raw_affiliation_strings":["Department of computing science, MIT building, Ume\u00e5 University, V\u00e4sterbotten, Ume\u00e5, 901 87, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of computing science, MIT building, Ume\u00e5 University, V\u00e4sterbotten, Ume\u00e5, 901 87, Sweden","institution_ids":["https://openalex.org/I90267481"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076985479","display_name":"Vicen\u00e7 Torra","orcid":"https://orcid.org/0000-0002-0368-8037"},"institutions":[{"id":"https://openalex.org/I90267481","display_name":"Ume\u00e5 University","ror":"https://ror.org/05kb8h459","country_code":"SE","type":"education","lineage":["https://openalex.org/I90267481"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Vicen\u00e7 Torra","raw_affiliation_strings":["Department of computing science, MIT building, Ume\u00e5 University, V\u00e4sterbotten, Ume\u00e5, 901 87, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of computing science, MIT building, Ume\u00e5 University, V\u00e4sterbotten, Ume\u00e5, 901 87, Sweden","institution_ids":["https://openalex.org/I90267481"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102789328"],"corresponding_institution_ids":["https://openalex.org/I90267481"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21576828,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"30","issue":"1","first_page":"107","last_page":"120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9200999736785889,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9200999736785889,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.014800000004470348,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.010700000450015068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6316999793052673},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5250999927520752},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4936000108718872},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.48739999532699585},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4763999879360199},{"id":"https://openalex.org/keywords/data-consistency","display_name":"Data consistency","score":0.4544000029563904},{"id":"https://openalex.org/keywords/uncertain-data","display_name":"Uncertain data","score":0.44279998540878296},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.43309998512268066}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7009999752044678},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6520000100135803},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6316999793052673},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5250999927520752},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4936000108718872},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.48739999532699585},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4763999879360199},{"id":"https://openalex.org/C93361087","wikidata":"https://www.wikidata.org/wiki/Q4426698","display_name":"Data consistency","level":2,"score":0.4544000029563904},{"id":"https://openalex.org/C2778865114","wikidata":"https://www.wikidata.org/wiki/Q7882489","display_name":"Uncertain data","level":2,"score":0.44279998540878296},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.43309998512268066},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.399399995803833},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.35519999265670776},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.3531999886035919},{"id":"https://openalex.org/C2988416141","wikidata":"https://www.wikidata.org/wiki/Q6031139","display_name":"Information loss","level":2,"score":0.3361000120639801},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.31709998846054077},{"id":"https://openalex.org/C17212007","wikidata":"https://www.wikidata.org/wiki/Q5511111","display_name":"Fuzzy clustering","level":3,"score":0.30979999899864197},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.3043000102043152},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.27410000562667847},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.2651999890804291},{"id":"https://openalex.org/C56372850","wikidata":"https://www.wikidata.org/wiki/Q1050404","display_name":"Sparse matrix","level":3,"score":0.2565999925136566},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.25529998540878296}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s00500-025-10948-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00500-025-10948-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00500-025-10948-7.pdf","source":{"id":"https://openalex.org/S65753830","display_name":"Soft Computing","issn_l":"1432-7643","issn":["1432-7643","1433-7479"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Soft Computing","raw_type":"journal-article"},{"id":"pmh:oai:DiVA.org:umu-247932","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-247932","pdf_url":"https://umu.diva-portal.org/smash/get/diva2:2025835/FULLTEXT01","source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/s00500-025-10948-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00500-025-10948-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00500-025-10948-7.pdf","source":{"id":"https://openalex.org/S65753830","display_name":"Soft Computing","issn_l":"1432-7643","issn":["1432-7643","1433-7479"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Soft Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417268333.pdf","grobid_xml":"https://content.openalex.org/works/W4417268333.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1492384615","https://openalex.org/W1592767064","https://openalex.org/W1843409134","https://openalex.org/W1968620120","https://openalex.org/W1995450389","https://openalex.org/W1998449509","https://openalex.org/W2026130198","https://openalex.org/W2033472483","https://openalex.org/W2050975551","https://openalex.org/W2081194871","https://openalex.org/W2089392707","https://openalex.org/W2108154570","https://openalex.org/W2128692927","https://openalex.org/W2129751437","https://openalex.org/W2137213577","https://openalex.org/W2152993171","https://openalex.org/W2298184867","https://openalex.org/W2552863215","https://openalex.org/W2783371987","https://openalex.org/W2884893917","https://openalex.org/W2946808855","https://openalex.org/W2959990386","https://openalex.org/W2964070360","https://openalex.org/W3132026153","https://openalex.org/W4281649558","https://openalex.org/W4283717718"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Microaggregation":[1],"is":[2,29,48],"a":[3,13,30,79,159,183],"powerful":[4],"technique":[5],"for":[6,33,73,186],"safeguarding":[7],"data,":[8,46],"enabling":[9],"us":[10,91],"to":[11,82,92,114,124,173],"strike":[12],"balance":[14],"between":[15],"the":[16,23,41,60,68,97,104,110,119,144,148,156,168,187],"risk":[17],"of":[18,25,44,62,147,158,170,192],"disclosing":[19],"sensitive":[20],"information":[21],"and":[22,167,190],"loss":[24],"valuable":[26],"information.":[27],"It":[28],"crucial":[31],"tool":[32],"data":[34,55,75,120,132,149],"sharing":[35,191],"that":[36,102,109],"provides":[37,182],"k":[38,136],"-anonymity.":[39],"With":[40],"growing":[42],"prevalence":[43],"multi-view":[45,74,86,139,160,193],"there":[47],"an":[49],"increasing":[50],"interest":[51],"in":[52,99,138],"protecting":[53],"such":[54],"using":[56],"appropriate":[57],"techniques.":[58],"To":[59],"best":[61],"our":[63],"knowledge,":[64],"this":[65],"paper":[66],"introduces":[67],"first":[69],"approach":[70,81,128,181],"specifically":[71],"designed":[72],"protection.":[76],"We":[77],"present":[78],"novel":[80],"microaggregation":[83],"by":[84,134],"introducing":[85],"fuzzy":[87],"c-means,":[88],"which":[89],"allows":[90],"consider":[93],"linear":[94,171],"constraints":[95,172],"on":[96],"variables":[98],"each":[100],"view":[101],"describe":[103],"data.":[105,194],"Our":[106,153],"method":[107],"ensures":[108],"resulting":[111],"clusters":[112],"adhere":[113],"these":[115],"constraints,":[116],"even":[117],"when":[118],"being":[121],"masked":[122],"fails":[123],"satisfy":[125],"them.":[126],"This":[127,179],"not":[129],"only":[130],"enhances":[131],"privacy":[133,165],"maintaining":[135],"-anonymity":[137],"contexts":[140],"but":[141],"also":[142],"preserves":[143],"structural":[145],"integrity":[146],"across":[150,176],"different":[151],"views.":[152,178],"contributions":[154],"include":[155],"development":[157],"clustering":[161],"framework":[162],"with":[163],"built-in":[164],"safeguards":[166],"introduction":[169],"ensure":[174],"consistency":[175],"multiple":[177],"innovative":[180],"robust":[184],"solution":[185],"privacy-preserving":[188],"analysis":[189]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-12-12T00:00:00"}
