{"id":"https://openalex.org/W2946984295","doi":"https://doi.org/10.1109/access.2019.2919165","title":"A New Method of Privacy Protection: Random k-Anonymous","display_name":"A New Method of Privacy Protection: Random k-Anonymous","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2946984295","doi":"https://doi.org/10.1109/access.2019.2919165","mag":"2946984295"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2919165","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2919165","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08723027.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08723027.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066475074","display_name":"Fagen Song","orcid":"https://orcid.org/0000-0003-3801-8508"},"institutions":[{"id":"https://openalex.org/I4210157719","display_name":"Yancheng Institute of Technology","ror":"https://ror.org/04y8njc86","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210157719"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fagen Song","raw_affiliation_strings":["Yancheng Institute of Technology, Yancheng, China"],"raw_orcid":"https://orcid.org/0000-0003-3801-8508","affiliations":[{"raw_affiliation_string":"Yancheng Institute of Technology, Yancheng, China","institution_ids":["https://openalex.org/I4210157719"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053920875","display_name":"Tinghuai Ma","orcid":"https://orcid.org/0000-0003-2320-1692"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tinghuai Ma","raw_affiliation_strings":["School of Computer & Software, Nanjing University of Information Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0003-2320-1692","affiliations":[{"raw_affiliation_string":"School of Computer & Software, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035919430","display_name":"Yuan Tian","orcid":"https://orcid.org/0000-0002-2307-8201"},"institutions":[{"id":"https://openalex.org/I2799736854","display_name":"Nanjing Institute of Technology","ror":"https://ror.org/00n6txq60","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799736854"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Tian","raw_affiliation_strings":["Nanjing Institute of Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-2307-8201","affiliations":[{"raw_affiliation_string":"Nanjing Institute of Technology, Nanjing, China","institution_ids":["https://openalex.org/I2799736854"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023598867","display_name":"Mznah Al\u2010Rodhaan","orcid":"https://orcid.org/0000-0002-9790-5345"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mznah Al-Rodhaan","raw_affiliation_strings":["Computer Science Department, King Saud University, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-9790-5345","affiliations":[{"raw_affiliation_string":"Computer Science Department, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066475074"],"corresponding_institution_ids":["https://openalex.org/I4210157719"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.3229,"has_fulltext":true,"cited_by_count":50,"citation_normalized_percentile":{"value":0.91131869,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"7","issue":null,"first_page":"75434","last_page":"75445"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-anonymity","score":0.7677799463272095},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7119492292404175},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.6653309464454651},{"id":"https://openalex.org/keywords/equivalence","display_name":"Equivalence (formal languages)","score":0.6185511350631714},{"id":"https://openalex.org/keywords/categorical-variable","display_name":"Categorical variable","score":0.6143090724945068},{"id":"https://openalex.org/keywords/information-loss","display_name":"Information loss","score":0.6056979298591614},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5598372220993042},{"id":"https://openalex.org/keywords/equivalence-class","display_name":"Equivalence class (music)","score":0.5383224487304688},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5089542865753174},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5011026859283447},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4778535068035126},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.4338723123073578},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40642938017845154},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.368866503238678},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3603378236293793},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3335428833961487},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.33153006434440613},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2298421561717987},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.174739271402359},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.12846553325653076},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09869137406349182},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.07457274198532104}],"concepts":[{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.7677799463272095},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7119492292404175},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.6653309464454651},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.6185511350631714},{"id":"https://openalex.org/C5274069","wikidata":"https://www.wikidata.org/wiki/Q2285707","display_name":"Categorical variable","level":2,"score":0.6143090724945068},{"id":"https://openalex.org/C2988416141","wikidata":"https://www.wikidata.org/wiki/Q6031139","display_name":"Information loss","level":2,"score":0.6056979298591614},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5598372220993042},{"id":"https://openalex.org/C2777044963","wikidata":"https://www.wikidata.org/wiki/Q5384707","display_name":"Equivalence class (music)","level":2,"score":0.5383224487304688},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5089542865753174},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5011026859283447},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4778535068035126},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.4338723123073578},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40642938017845154},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.368866503238678},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3603378236293793},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3335428833961487},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.33153006434440613},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2298421561717987},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.174739271402359},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.12846553325653076},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09869137406349182},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.07457274198532104},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2919165","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2919165","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08723027.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d45f08ec62b84d44a764864769d97ff8","is_oa":true,"landing_page_url":"https://doaj.org/article/d45f08ec62b84d44a764864769d97ff8","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 75434-75445 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2919165","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2919165","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08723027.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1550131050","display_name":null,"funder_award_id":"61572259","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6560771554","display_name":null,"funder_award_id":"U1736105","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320335726","display_name":"Deanship of Scientific Research, King Saud University","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2946984295.pdf","grobid_xml":"https://content.openalex.org/works/W2946984295.grobid-xml"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W286208473","https://openalex.org/W839407891","https://openalex.org/W1479970606","https://openalex.org/W1606251440","https://openalex.org/W1967525428","https://openalex.org/W1968752677","https://openalex.org/W1975937116","https://openalex.org/W1978855586","https://openalex.org/W2061080216","https://openalex.org/W2083761388","https://openalex.org/W2085988980","https://openalex.org/W2091815328","https://openalex.org/W2091913942","https://openalex.org/W2093099348","https://openalex.org/W2099322651","https://openalex.org/W2101771965","https://openalex.org/W2109426455","https://openalex.org/W2116241118","https://openalex.org/W2119047901","https://openalex.org/W2119067110","https://openalex.org/W2123820077","https://openalex.org/W2134479759","https://openalex.org/W2136114025","https://openalex.org/W2149230623","https://openalex.org/W2248469562","https://openalex.org/W2284973007","https://openalex.org/W2294904676","https://openalex.org/W2595094219","https://openalex.org/W2752778006","https://openalex.org/W2791095803","https://openalex.org/W2792034376","https://openalex.org/W2883330559","https://openalex.org/W2887202921","https://openalex.org/W2911978475","https://openalex.org/W2921713999","https://openalex.org/W3122751563","https://openalex.org/W6636171097","https://openalex.org/W6665840818","https://openalex.org/W6679975643","https://openalex.org/W6697139857"],"related_works":["https://openalex.org/W2098331493","https://openalex.org/W2073216087","https://openalex.org/W2789800774","https://openalex.org/W2176473220","https://openalex.org/W2113844214","https://openalex.org/W1985313039","https://openalex.org/W2310363298","https://openalex.org/W2946984295","https://openalex.org/W2985109074","https://openalex.org/W2162335893"],"abstract_inverted_index":{"A":[0],"new":[1],"k-anonymous":[2,9,23,31,55],"method":[3,75,135],"which":[4],"is":[5,68,76,92,136,146],"different":[6,96,125],"from":[7],"traditional":[8],"was":[10],"proposed":[11,134],"to":[12,78],"solve":[13],"the":[14,36,40,49,54,62,80,88,100,106,111,129,133,140],"problem":[15],"of":[16,64,114,143],"privacy":[17],"protection.":[18],"Specifically,":[19],"numerical":[20],"data":[21,29,56,82,90,126],"achieves":[22,30],"by":[24,32],"adding":[25],"noises,":[26],"and":[27,98,128,139],"categorical":[28],"using":[33],"randomization.":[34],"Using":[35],"above":[37],"two":[38],"methods,":[39],"drawback":[41],"that":[42,132],"at":[43],"least":[44],"k":[45],"elements":[46],"must":[47],"have":[48],"same":[50],"quasi":[51],"identifier":[52],"in":[53,105],"set":[57,83,91],"has":[58],"been":[59],"solved.":[60],"Since":[61],"process":[63],"finding":[65,115],"anonymous":[66,116,144],"equivalence":[67,85,101,117],"very":[69],"time":[70],"consuming,":[71],"a":[72],"two-step":[73],"clustering":[74],"used":[77],"divide":[79],"original":[81,89],"into":[84,94],"classes.":[86,118],"First,":[87],"divided":[93],"several":[95],"sub-datasets,":[97,107],"then":[99],"classes":[102],"are":[103,121],"formed":[104],"thus":[108],"greatly":[109],"reducing":[110],"computational":[112],"cost":[113],"The":[119],"experiments":[120],"conducted":[122],"on":[123],"three":[124],"sets,":[127],"results":[130],"show":[131],"more":[137],"efficient":[138],"information":[141],"loss":[142],"dataset":[145],"much":[147],"smaller.":[148]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":21},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
