{"id":"https://openalex.org/W2099966938","doi":"https://doi.org/10.1108/20439371211260135","title":"Privacy preserving method based on GM(1,1) and its application to clustering","display_name":"Privacy preserving method based on GM(1,1) and its application to clustering","publication_year":2012,"publication_date":"2012-08-17","ids":{"openalex":"https://openalex.org/W2099966938","doi":"https://doi.org/10.1108/20439371211260135","mag":"2099966938"},"language":"en","primary_location":{"id":"doi:10.1108/20439371211260135","is_oa":false,"landing_page_url":"https://doi.org/10.1108/20439371211260135","pdf_url":null,"source":{"id":"https://openalex.org/S4210188239","display_name":"Grey Systems Theory and Application","issn_l":"2043-9377","issn":["2043-9377","2043-9385"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Grey Systems: Theory and Application","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100765132","display_name":"Kun Guo","orcid":"https://orcid.org/0000-0002-6270-2468"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kun Guo","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072628365","display_name":"Zhang Qishan","orcid":"https://orcid.org/0000-0003-1225-3729"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qishan Zhang","raw_affiliation_strings":["Management School, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Management School, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100765132"],"corresponding_institution_ids":["https://openalex.org/I80947539"],"apc_list":null,"apc_paid":null,"fwci":2.1407,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.88790199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2","issue":"2","first_page":"157","last_page":"165"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10136","display_name":"Statistical Methods and Inference","score":0.9233999848365784,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7592794299125671},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7329134345054626},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.6530141234397888},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.603794276714325},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5727864503860474},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5271943211555481},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5017185211181641},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4705548584461212},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3680461049079895},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2593589425086975},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.22119441628456116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1809948980808258}],"concepts":[{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7592794299125671},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7329134345054626},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.6530141234397888},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.603794276714325},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5727864503860474},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5271943211555481},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5017185211181641},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4705548584461212},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3680461049079895},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2593589425086975},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.22119441628456116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1809948980808258},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/20439371211260135","is_oa":false,"landing_page_url":"https://doi.org/10.1108/20439371211260135","pdf_url":null,"source":{"id":"https://openalex.org/S4210188239","display_name":"Grey Systems Theory and Application","issn_l":"2043-9377","issn":["2043-9377","2043-9385"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Grey Systems: Theory and Application","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1548445892","https://openalex.org/W1569223999","https://openalex.org/W1999602050","https://openalex.org/W2006691510","https://openalex.org/W2022079499","https://openalex.org/W2066991089","https://openalex.org/W2111272198","https://openalex.org/W2119104412","https://openalex.org/W2128906841","https://openalex.org/W2145782330","https://openalex.org/W2157774701","https://openalex.org/W2161470918","https://openalex.org/W2164341199","https://openalex.org/W2166825417","https://openalex.org/W2178073758","https://openalex.org/W2381954871","https://openalex.org/W2563760868","https://openalex.org/W2769353087","https://openalex.org/W7070958996"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W3046095319","https://openalex.org/W3197497514","https://openalex.org/W1591172238","https://openalex.org/W2111194702","https://openalex.org/W2972172135","https://openalex.org/W1787552957","https://openalex.org/W315296216","https://openalex.org/W4300474583","https://openalex.org/W3147973582"],"abstract_inverted_index":{"Purpose":[0],"The":[1,91,106],"purpose":[2],"of":[3,26,60,115],"this":[4],"paper":[5,92],"is":[6,36,42,71],"to":[7,20,48,51,57,64,97,102],"provide":[8],"a":[9],"privacy":[10,25,75],"preserving":[11,76],"method":[12,77],"based":[13,78],"on":[14,79],"grey":[15,62,80,100],"model":[16,41,81,101],"and":[17,87,112],"apply":[18,98],"it":[19],"clustering,":[21],"so":[22,55],"that":[23,73],"the":[24,27,33,46,52,61,66,74,94,99,110,113,116],"individuals":[28],"can":[29,82],"be":[30],"protected":[31],"while":[32],"information":[34,63],"loss":[35],"kept":[37],"low.":[38],"Design/methodology/approach":[39],"GM(1,1)":[40],"utilized":[43],"reversely":[44],"in":[45],"approach":[47],"add":[49],"noise":[50],"original":[53],"data,":[54],"as":[56],"make":[58],"use":[59],"blur":[65],"true":[67],"one.":[68],"Findings":[69],"It":[70],"shown":[72],"achieve":[83],"both":[84],"high":[85,88],"effectiveness":[86,111],"efficiency.":[89],"Originality/value":[90],"presents":[93],"first":[95],"attempt":[96],"protect":[103],"data":[104],"privacy.":[105],"experimental":[107],"results":[108],"show":[109],"efficiency":[114],"proposed":[117],"method.":[118]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
