{"id":"https://openalex.org/W4210809683","doi":"https://doi.org/10.1109/globecom46510.2021.9685603","title":"Data Privacy Protection based on Feature Dilution in Cloud Services","display_name":"Data Privacy Protection based on Feature Dilution in Cloud Services","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4210809683","doi":"https://doi.org/10.1109/globecom46510.2021.9685603"},"language":"en","primary_location":{"id":"doi:10.1109/globecom46510.2021.9685603","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685603","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103150943","display_name":"Feng Wu","orcid":"https://orcid.org/0000-0001-7266-5579"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Feng Wu","raw_affiliation_strings":["School of Software Engineering, Yunnan University, Yunnan, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Yunnan University, Yunnan, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026963407","display_name":"Lei Cui","orcid":null},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lei Cui","raw_affiliation_strings":["School of Information Technology, Deakin University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Sydney, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041047743","display_name":"Jianan Feng","orcid":"https://orcid.org/0000-0002-6701-2730"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianan Feng","raw_affiliation_strings":["School of Software Engineering, Yunnan University, Yunnan, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Yunnan University, Yunnan, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102018872","display_name":"Liwen Wu","orcid":"https://orcid.org/0000-0002-4959-444X"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liwen Wu","raw_affiliation_strings":["School of Software Engineering, Yunnan University, Yunnan, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Yunnan University, Yunnan, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027960289","display_name":"Saowen Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Saowen Yao","raw_affiliation_strings":["School of Software Engineering, Yunnan University, Yunnan, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Yunnan University, Yunnan, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Computer Science, University of Technology Sydney, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5103150943"],"corresponding_institution_ids":["https://openalex.org/I189210763"],"apc_list":null,"apc_paid":null,"fwci":0.2513,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.5395401,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.7116215229034424},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7097858786582947},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6077433824539185},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5957773923873901},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5448309779167175},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5080430507659912},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.42225056886672974},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38543635606765747},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.056582361459732056}],"concepts":[{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.7116215229034424},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7097858786582947},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6077433824539185},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5957773923873901},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5448309779167175},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5080430507659912},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.42225056886672974},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38543635606765747},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.056582361459732056},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom46510.2021.9685603","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685603","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5150863508","display_name":null,"funder_award_id":"61863036","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2031738616","https://openalex.org/W2108598243","https://openalex.org/W2294710185","https://openalex.org/W2417915283","https://openalex.org/W2435473771","https://openalex.org/W2783357829","https://openalex.org/W2793398195","https://openalex.org/W2801491268","https://openalex.org/W2805074088","https://openalex.org/W2889746123","https://openalex.org/W2907842073","https://openalex.org/W2911174318","https://openalex.org/W2912213068","https://openalex.org/W3016391357","https://openalex.org/W3085052658","https://openalex.org/W3114228379","https://openalex.org/W6751922297","https://openalex.org/W6787301680"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W2116878667","https://openalex.org/W4396832952","https://openalex.org/W3013058036","https://openalex.org/W3015944045","https://openalex.org/W4225340788","https://openalex.org/W1591172238","https://openalex.org/W2951971312","https://openalex.org/W2972172135","https://openalex.org/W4300474583"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"as":[2],"a":[3,58],"service":[4,15,178],"(MLaaS)":[5],"brings":[6],"many":[7],"benefits":[8],"to":[9,62,77,112,130,150,174],"people&#x0027;s":[10],"daily":[11],"life.":[12],"However,":[13],"the":[14,21,78,84,101,132],"mode":[16],"of":[17,23,134],"MLaaS":[18,102],"will":[19],"increase":[20],"risk":[22,133],"users&#x0027;":[24],"privacy":[25,135],"leakage.":[26],"Existing":[27],"works":[28],"focusing":[29],"on":[30,33,164],"privacy-preserving":[31],"based":[32],"encryption,":[34],"differential":[35],"privacy,":[36],"and":[37,91,167],"distributed":[38],"framework":[39],"require":[40],"high":[41],"computing":[42],"resources":[43],"or":[44],"cannot":[45],"be":[46],"applied":[47],"in":[48,66],"MLaaS.":[49],"In":[50,69],"this":[51,94],"paper,":[52],"we":[53,92,104,160],"propose":[54],"feature":[55],"dilution":[56],"(FD),":[57],"noise-based":[59],"desensitization":[60],"algorithm":[61],"remove":[63],"sensitive":[64],"information":[65],"raw":[67,74],"data.":[68,121,158],"particular,":[70],"FD":[71,149],"continuously":[72],"adds":[73],"data":[75],"features":[76],"random":[79],"noise":[80,95,97,123],"until":[81],"it":[82],"meets":[83],"minimum":[85],"amount":[86],"for":[87],"an":[88],"effective":[89,152],"query,":[90],"call":[93],"weak-feature":[96,165],"(WFN).":[98],"By":[99],"fine-tuning":[100],"architecture,":[103],"have":[105,143],"realized":[106],"that":[107,145,169],"users":[108,146],"can":[109,147],"utilize":[110],"WFN":[111],"get":[113],"normal":[114],"services":[115,153],"without":[116,154],"exposing":[117,155],"their":[118,156],"local":[119],"private":[120,157],"Meanwhile,":[122],"addition":[124],"technology":[125],"is":[126],"introduced":[127],"by":[128,138,176],"us":[129],"reduce":[131],"leakage":[136],"caused":[137],"&#x201C;weak":[139],"features&#x201D;.":[140],"Extensive":[141],"experiments":[142],"demonstrated":[144],"use":[148,175],"obtain":[151],"Finally,":[159],"conducted":[161],"practical":[162],"tests":[163],"noises":[166,171],"found":[168],"these":[170],"are":[172],"difficult":[173],"malicious":[177],"providers.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
