{"id":"https://openalex.org/W2007520928","doi":"https://doi.org/10.1109/cscwd.2014.6846828","title":"A data anonymous method based on overlapping slicing","display_name":"A data anonymous method based on overlapping slicing","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2007520928","doi":"https://doi.org/10.1109/cscwd.2014.6846828","mag":"2007520928"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd.2014.6846828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2014.6846828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100753238","display_name":"Jing Yang","orcid":"https://orcid.org/0000-0001-6646-3401"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Yang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101893454","display_name":"Ziyun Liu","orcid":"https://orcid.org/0000-0003-2992-7590"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyun Liu","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101488603","display_name":"Yue Yang","orcid":"https://orcid.org/0000-0002-0987-1369"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Yang","raw_affiliation_strings":["Harbin Engineering University, Harbin, Heilongjiang, CN","[Harbin Engineering University, Harbin, Heilongjiang, CN]"],"affiliations":[{"raw_affiliation_string":"Harbin Engineering University, Harbin, Heilongjiang, CN","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"[Harbin Engineering University, Harbin, Heilongjiang, CN]","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014514590","display_name":"Jianpei Zhang","orcid":"https://orcid.org/0000-0002-9339-0268"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianpei Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100753238"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":0.409,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.73122612,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"45","issue":null,"first_page":"124","last_page":"128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/slicing","display_name":"Slicing","score":0.9188406467437744},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8207522034645081},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6726597547531128},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6355266571044922},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5230844020843506},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5215580463409424},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.48601824045181274},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47822755575180054},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.37529587745666504},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3340036869049072},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20771458745002747},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1999458372592926},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.190363347530365},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09926116466522217}],"concepts":[{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.9188406467437744},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8207522034645081},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6726597547531128},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6355266571044922},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5230844020843506},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5215580463409424},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.48601824045181274},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47822755575180054},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.37529587745666504},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3340036869049072},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20771458745002747},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1999458372592926},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.190363347530365},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09926116466522217},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd.2014.6846828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2014.6846828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2019376841","https://openalex.org/W2052806235","https://openalex.org/W2119067110","https://openalex.org/W2120263102","https://openalex.org/W2120582309","https://openalex.org/W2134479759","https://openalex.org/W2134871210","https://openalex.org/W2159024459","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2185528434","https://openalex.org/W2975449868","https://openalex.org/W2306863078","https://openalex.org/W3148376640","https://openalex.org/W2500732036","https://openalex.org/W2182490965","https://openalex.org/W2061451387","https://openalex.org/W2019376841","https://openalex.org/W4385403010","https://openalex.org/W3015404069"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"data":[3,39,57,63,81,89,100],"dissemination":[4],"privacy":[5,14],"protection":[6],"issues":[7],"received":[8],"extensive":[9],"attention.":[10],"A":[11],"variety":[12],"of":[13,46,55,87],"preserving":[15],"anonymity":[16],"models":[17],"and":[18,24,65,83],"technology,":[19],"such":[20],"as":[21],"generalization,":[22],"anatomy":[23],"slicing":[25,78,97],"have":[26],"been":[27],"proposed.":[28],"We":[29,70],"present":[30,51],"a":[31,52],"new":[32],"technique":[33],"-":[34],"overlapping":[35,77,96],"slicing,":[36],"it":[37],"handles":[38],"attributes":[40],"mainly":[41],"based":[42],"on":[43],"the":[44,85,91],"idea":[45],"fuzzy":[47],"clustering.":[48],"And":[49],"we":[50],"linear":[53],"algorithm":[54],"processing":[56],"with":[58],"group":[59],"to":[60,74],"generate":[61],"multiple":[62],"tables,":[64],"make":[66],"them":[67],"satisfy":[68],"l-diversity.":[69],"conduct":[71],"several":[72],"experiments":[73],"confirm":[75],"that":[76],"technology":[79],"ensures":[80],"security":[82],"improves":[84],"effectiveness":[86],"anonymous":[88],"at":[90],"same":[92],"time.":[93],"What's":[94],"more,":[95],"processes":[98],"high-dimensional":[99],"effectively.":[101]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
