{"id":"https://openalex.org/W4388936655","doi":"https://doi.org/10.1109/access.2023.3336413","title":"PLI-Assess: A Behavior Profile-Based Approach for Privacy-Preserving Log Assessment","display_name":"PLI-Assess: A Behavior Profile-Based Approach for Privacy-Preserving Log Assessment","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4388936655","doi":"https://doi.org/10.1109/access.2023.3336413"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3336413","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2023.3336413","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10328570.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10328570.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101972316","display_name":"Geng Wang","orcid":"https://orcid.org/0009-0001-4774-1469"},"institutions":[{"id":"https://openalex.org/I184681353","display_name":"Anhui University of Science and Technology","ror":"https://ror.org/00q9atg80","country_code":"CN","type":"education","lineage":["https://openalex.org/I184681353"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Geng Wang","raw_affiliation_strings":["College of Mathematics and Big Data, Anhui University of Science and Technology, Huainan, China","College of Mathematics and Big Data, Anhui University of Science and Technology, Huainan, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Big Data, Anhui University of Science and Technology, Huainan, China","institution_ids":["https://openalex.org/I184681353"]},{"raw_affiliation_string":"College of Mathematics and Big Data, Anhui University of Science and Technology, Huainan, People's Republic of China","institution_ids":["https://openalex.org/I184681353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101663219","display_name":"Huan Fang","orcid":"https://orcid.org/0000-0001-7807-2117"},"institutions":[{"id":"https://openalex.org/I184681353","display_name":"Anhui University of Science and Technology","ror":"https://ror.org/00q9atg80","country_code":"CN","type":"education","lineage":["https://openalex.org/I184681353"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huan Fang","raw_affiliation_strings":["College of Mathematics and Big Data, Anhui University of Science and Technology, Huainan, China","Anhui Province Engineering Laboratory of Big Data Analysis and Early Warning Technology of Coal Mine Safety, Huainan, People's Republic of China","College of Mathematics and Big Data, Anhui University of Science and Technology, Huainan, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Big Data, Anhui University of Science and Technology, Huainan, China","institution_ids":["https://openalex.org/I184681353"]},{"raw_affiliation_string":"Anhui Province Engineering Laboratory of Big Data Analysis and Early Warning Technology of Coal Mine Safety, Huainan, People's Republic of China","institution_ids":[]},{"raw_affiliation_string":"College of Mathematics and Big Data, Anhui University of Science and Technology, Huainan, People's Republic of China","institution_ids":["https://openalex.org/I184681353"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101972316"],"corresponding_institution_ids":["https://openalex.org/I184681353"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.3284,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66241441,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"11","issue":null,"first_page":"133160","last_page":"133173"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8212383985519409},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.8120192289352417},{"id":"https://openalex.org/keywords/process-mining","display_name":"Process mining","score":0.7199892997741699},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.696213960647583},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.5717394948005676},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5406938791275024},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5036935210227966},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4945997893810272},{"id":"https://openalex.org/keywords/business-process","display_name":"Business process","score":0.40611422061920166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3304610848426819},{"id":"https://openalex.org/keywords/work-in-process","display_name":"Work in process","score":0.28625166416168213},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17158463597297668},{"id":"https://openalex.org/keywords/business-process-management","display_name":"Business process management","score":0.14980974793434143},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08052724599838257}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8212383985519409},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.8120192289352417},{"id":"https://openalex.org/C124670913","wikidata":"https://www.wikidata.org/wiki/Q2608526","display_name":"Process mining","level":5,"score":0.7199892997741699},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.696213960647583},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.5717394948005676},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5406938791275024},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5036935210227966},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4945997893810272},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.40611422061920166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3304610848426819},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.28625166416168213},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17158463597297668},{"id":"https://openalex.org/C80309976","wikidata":"https://www.wikidata.org/wiki/Q7007379","display_name":"Business process management","level":4,"score":0.14980974793434143},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08052724599838257},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3336413","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2023.3336413","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10328570.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5a92d487b68a4312911e9db57e625a1a","is_oa":true,"landing_page_url":"https://doaj.org/article/5a92d487b68a4312911e9db57e625a1a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 133160-133173 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3336413","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2023.3336413","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10328570.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5500432845","display_name":null,"funder_award_id":"61902002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4388936655.pdf","grobid_xml":"https://content.openalex.org/works/W4388936655.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1926556181","https://openalex.org/W2028754077","https://openalex.org/W2137181315","https://openalex.org/W2460683825","https://openalex.org/W2530196882","https://openalex.org/W2551862867","https://openalex.org/W2740689699","https://openalex.org/W2944867690","https://openalex.org/W2953527936","https://openalex.org/W2965446139","https://openalex.org/W2967547316","https://openalex.org/W2979771948","https://openalex.org/W2980628107","https://openalex.org/W3015834167","https://openalex.org/W3025050471","https://openalex.org/W3037497480","https://openalex.org/W3083253029","https://openalex.org/W3089859011","https://openalex.org/W3122238742","https://openalex.org/W3158015518","https://openalex.org/W3167495558","https://openalex.org/W3205797479","https://openalex.org/W4230145224","https://openalex.org/W4242763616","https://openalex.org/W4285129888","https://openalex.org/W4364374404","https://openalex.org/W4382203162","https://openalex.org/W6739049096","https://openalex.org/W6741464371","https://openalex.org/W6757667809","https://openalex.org/W6764775447","https://openalex.org/W6783111764","https://openalex.org/W6786303287"],"related_works":["https://openalex.org/W2150478723","https://openalex.org/W4365511202","https://openalex.org/W4300560926","https://openalex.org/W2361278909","https://openalex.org/W2352536444","https://openalex.org/W2349982312","https://openalex.org/W2979752478","https://openalex.org/W4389937450","https://openalex.org/W2388605575","https://openalex.org/W4384526091"],"abstract_inverted_index":{"Event":[0],"logs":[1,16,27,43,64,123,143,230],"of":[2,22,33,41,53,90,94,101,116,152,227,241],"business":[3],"processes":[4],"provide":[5],"a":[6,30,207],"valuable":[7],"starting":[8],"point":[9,115],"for":[10,231],"process":[11,23,96,197],"mining,":[12],"and":[13,35,65,77,124,144,163,186],"high-quality":[14],"event":[15,26,42,63,122,142,153,179,210,229],"can":[17],"significantly":[18],"enhance":[19],"the":[20,39,46,51,61,66,70,88,99,109,114,120,136,140,145,234],"quality":[21,48],"mining.":[24],"However,":[25],"often":[28],"contain":[29],"substantial":[31],"amount":[32],"sensitive":[34],"personal":[36],"information.":[37],"Therefore,":[38],"release":[40,155,212],"should":[44],"prioritize":[45],"model\u2019s":[47],"while":[49],"minimizing":[50],"risk":[52],"privacy":[54,75,161,184],"exposure.":[55],"Specifically,":[56,149],"quantifying":[57],"performance":[58,84,111],"indicators":[59,112],"between":[60,119,139],"original":[62,121,141],"released":[67,125,147,182],"ones":[68],"enables":[69],"operational":[71],"goals.":[72],"To":[73,98],"date,":[74],"benefit":[76],"utility":[78,165],"loss":[79,166],"are":[80],"two":[81],"main":[82],"target":[83],"indicators,":[85],"especially":[86],"from":[87,113],"perspective":[89],"structural":[91],"similarity":[92],"comparison":[93],"mined":[95],"models.":[97],"best":[100],"our":[102],"knowledge,":[103],"no":[104],"study":[105],"aims":[106],"to":[107,134,216],"measure":[108],"privacy-preserving":[110],"behavior":[117,137,160,164,208],"differentiation":[118,138],"ones.":[126,148],"In":[127],"this":[128,170],"paper,":[129],"we":[130,173,205,221],"propose":[131],"an":[132,150],"approach":[133,151],"quantify":[135],"corresponding":[146],"log":[154,211],"mechanism":[156,213],"that":[157,190],"effectively":[158],"combines":[159],"gain":[162],"is":[167,181],"presented":[168],"in":[169,176],"paper.":[171],"Firstly,":[172],"discuss":[174],"challenges":[175],"scenarios":[177],"where":[178],"data":[180],"without":[183],"preservation,":[185],"describe":[187],"potential":[188,203],"attacks":[189],"could":[191],"occur":[192],"when":[193],"third-party":[194],"businesses":[195],"perform":[196],"mining":[198],"techniques.":[199],"Based":[200],"on":[201,224],"these":[202,218],"attacks,":[204],"present":[206],"differentiation-based":[209],"named":[214],"PLI-Assess":[215],"combat":[217],"threats.":[219],"Finally,":[220],"conduct":[222],"experiments":[223],"four":[225],"groups":[226],"practical":[228],"comparisons":[232],"with":[233],"baseline":[235],"methods.The":[236],"experimental":[237],"results":[238],"suggest":[239],"feasibility":[240],"privacy-utility":[242],"trade-offs.":[243]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
