{"id":"https://openalex.org/W3020891655","doi":"https://doi.org/10.1109/ciss48834.2020.1570617434","title":"A Statistical Decision-Theoretic Approach for Measuring Privacy Risk and Utility in Databases","display_name":"A Statistical Decision-Theoretic Approach for Measuring Privacy Risk and Utility in Databases","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3020891655","doi":"https://doi.org/10.1109/ciss48834.2020.1570617434","mag":"3020891655"},"language":"en","primary_location":{"id":"doi:10.1109/ciss48834.2020.1570617434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss48834.2020.1570617434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068431498","display_name":"Alisa Miyashita","orcid":null},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Alisa Miyashita","raw_affiliation_strings":["Waseda University"],"affiliations":[{"raw_affiliation_string":"Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001719328","display_name":"Akira Kamatsuka","orcid":"https://orcid.org/0000-0001-5129-2638"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Akira Kamatsuka","raw_affiliation_strings":["Waseda University"],"affiliations":[{"raw_affiliation_string":"Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074257101","display_name":"Takahiro Yoshida","orcid":"https://orcid.org/0000-0003-2460-8101"},"institutions":[{"id":"https://openalex.org/I4210124684","display_name":"Yokohama College of Commerce","ror":"https://ror.org/02s5d1b23","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210124684"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takahiro Yoshida","raw_affiliation_strings":["Yokohama College of Commerce"],"affiliations":[{"raw_affiliation_string":"Yokohama College of Commerce","institution_ids":["https://openalex.org/I4210124684"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110471799","display_name":"Toshiyasu Matsushima","orcid":null},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toshiyasu Matsushima","raw_affiliation_strings":["Waseda University"],"affiliations":[{"raw_affiliation_string":"Waseda University","institution_ids":["https://openalex.org/I150744194"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068431498"],"corresponding_institution_ids":["https://openalex.org/I150744194"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.51950283,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7881585359573364},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7756431102752686},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5749390721321106},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.5383338332176208},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42296963930130005},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.42163461446762085},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.164203941822052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1334652304649353}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7881585359573364},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7756431102752686},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5749390721321106},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.5383338332176208},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42296963930130005},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.42163461446762085},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.164203941822052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1334652304649353},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ciss48834.2020.1570617434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss48834.2020.1570617434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W135467536","https://openalex.org/W1506806321","https://openalex.org/W1873763122","https://openalex.org/W1988520084","https://openalex.org/W2027595342","https://openalex.org/W2077145963","https://openalex.org/W2515654213","https://openalex.org/W2564029303","https://openalex.org/W2583220279","https://openalex.org/W2744172881","https://openalex.org/W2963446403","https://openalex.org/W2963535017","https://openalex.org/W3099542802","https://openalex.org/W4205228770"],"related_works":["https://openalex.org/W2923234599","https://openalex.org/W2961912854","https://openalex.org/W2915559073","https://openalex.org/W3094463742","https://openalex.org/W2884294946","https://openalex.org/W2951798800","https://openalex.org/W3209392453","https://openalex.org/W4241535341","https://openalex.org/W2950872755","https://openalex.org/W4311074414"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,59,78,107],"deal":[4],"with":[5,12],"the":[6,29,42,50,53,68,75,80,103],"problem":[7],"of":[8,27,65,67,72,82,102],"database":[9,43,69],"statistics":[10,30,66],"publishing":[11],"privacy":[13,19,111],"and":[14,20,34,37,52,70,92,109],"utility":[15,21,93],"guarantees.":[16],"While":[17],"various":[18],"metrics":[22,94],"have":[23,44],"been":[24,46],"proposed,":[25],"purposes":[26,81],"using":[28],"for":[31,74],"a":[32,116],"user":[33,51],"an":[35],"adversary":[36,54],"their":[38,61],"background":[39,62],"knowledge":[40,64,71],"about":[41],"not":[45],"specified.":[47],"We":[48],"model":[49,60,79],"from":[55],"two":[56],"perspectives.":[57],"First,":[58],"knowledge:":[63],"distribution":[73],"database.":[76],"Then":[77],"them":[83],"as":[84],"decision":[85,89],"functions":[86],"in":[87],"statistical":[88,104],"theory.":[90],"Privacy":[91],"are":[95],"defined":[96],"based":[97],"on":[98],"risk":[99],"functions.":[100],"Comparison":[101],"decision-theoretic":[105],"framework":[106,112],"propose":[108],"differential":[110],"is":[113],"made":[114],"through":[115],"numerical":[117],"example.":[118]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
