{"id":"https://openalex.org/W2240730657","doi":"https://doi.org/10.1109/fskd.2015.7382040","title":"Preserving network privacy with a hierarchical structure approach","display_name":"Preserving network privacy with a hierarchical structure approach","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2240730657","doi":"https://doi.org/10.1109/fskd.2015.7382040","mag":"2240730657"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2015.7382040","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2015.7382040","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100334619","display_name":"Liang Chen","orcid":"https://orcid.org/0000-0002-6598-1036"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liang Chen","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":null,"display_name":"Peidong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peidong Zhu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100334619"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.08030433,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"6","issue":null,"first_page":"773","last_page":"777"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7842843532562256},{"id":"https://openalex.org/keywords/markov-chain-monte-carlo","display_name":"Markov chain Monte Carlo","score":0.7795799970626831},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6695838570594788},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.5664129853248596},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5655848383903503},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5623342394828796},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4989032745361328},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.48671844601631165},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4796212613582611},{"id":"https://openalex.org/keywords/hierarchical-database-model","display_name":"Hierarchical database model","score":0.43727853894233704},{"id":"https://openalex.org/keywords/random-graph","display_name":"Random graph","score":0.4328742027282715},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.38560283184051514},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3053153157234192},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.2805430293083191},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.24791574478149414},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23958522081375122},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21737340092658997},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.17153191566467285},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17152619361877441},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.07548245787620544}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7842843532562256},{"id":"https://openalex.org/C111350023","wikidata":"https://www.wikidata.org/wiki/Q1191869","display_name":"Markov chain Monte Carlo","level":3,"score":0.7795799970626831},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6695838570594788},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.5664129853248596},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5655848383903503},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5623342394828796},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4989032745361328},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.48671844601631165},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4796212613582611},{"id":"https://openalex.org/C144986985","wikidata":"https://www.wikidata.org/wiki/Q871236","display_name":"Hierarchical database model","level":2,"score":0.43727853894233704},{"id":"https://openalex.org/C47458327","wikidata":"https://www.wikidata.org/wiki/Q910404","display_name":"Random graph","level":3,"score":0.4328742027282715},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.38560283184051514},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3053153157234192},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2805430293083191},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.24791574478149414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23958522081375122},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21737340092658997},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.17153191566467285},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17152619361877441},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.07548245787620544}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2015.7382040","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2015.7382040","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W204323566","https://openalex.org/W1528076390","https://openalex.org/W1666636243","https://openalex.org/W1873763122","https://openalex.org/W1973980096","https://openalex.org/W1993116423","https://openalex.org/W2027029143","https://openalex.org/W2062832390","https://openalex.org/W2123820077","https://openalex.org/W2128906841","https://openalex.org/W2129061523","https://openalex.org/W2129157759","https://openalex.org/W2132678785","https://openalex.org/W2135930857","https://openalex.org/W2140096141","https://openalex.org/W2157082398","https://openalex.org/W2159024459","https://openalex.org/W2168433392","https://openalex.org/W2588035068","https://openalex.org/W3006663570","https://openalex.org/W6679290131","https://openalex.org/W6680267248","https://openalex.org/W6680880927"],"related_works":["https://openalex.org/W3038283795","https://openalex.org/W2604501336","https://openalex.org/W2734500670","https://openalex.org/W2558166297","https://openalex.org/W2315671126","https://openalex.org/W798507144","https://openalex.org/W2964481303","https://openalex.org/W1751413323","https://openalex.org/W2571704763","https://openalex.org/W3206394311"],"abstract_inverted_index":{"With":[0],"the":[1,6,26,30,32,37,43,76,99,107,121,125],"development":[2],"of":[3,11,45,52,101,106],"Internet":[4],"technologies,":[5],"influences":[7],"on":[8,65,109,124],"people's":[9],"lives":[10],"online":[12],"social":[13,27],"networks":[14],"(OSN)":[15],"gradually":[16],"increase.":[17],"These":[18],"OSNs":[19],"often":[20],"contain":[21],"sensitive":[22],"information,":[23],"such":[24,46],"as":[25],"contacts":[28],"in":[29,36],"email,":[31],"personal":[33,53],"consumption":[34],"records":[35],"e-commerce":[38],"and":[39],"so":[40],"on.":[41],"Therefore,":[42],"disclosure":[44],"information":[47,123],"would":[48],"lead":[49],"to":[50],"violation":[51],"privacy.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58],"propose":[59],"a":[60,66,88,129],"differential":[61,83],"privacy":[62,84],"approach":[63,117],"based":[64],"hierarchical":[67,77],"network":[68,102,126],"model.":[69,81],"The":[70,82,104],"OSN":[71],"structure":[72],"is":[73,85],"obtained":[74],"by":[75,87],"random":[78],"graph":[79],"(HRG)":[80],"guaranteed":[86],"Markov":[89],"chain":[90],"Monte":[91],"Carlo":[92],"(MCMC)":[93],"sample":[94],"method.":[95],"MCMC":[96],"method":[97],"ensures":[98],"utility":[100],"data.":[103],"results":[105],"experiment":[108],"two":[110],"real":[111],"world":[112],"datasets":[113],"show":[114],"that":[115],"our":[116],"can":[118],"effectively":[119],"protect":[120],"critical":[122],"while":[127],"maintaining":[128],"good":[130],"data":[131],"utility.":[132]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
