{"id":"https://openalex.org/W2917559515","doi":"https://doi.org/10.1109/glocom.2018.8647941","title":"AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data","display_name":"AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2917559515","doi":"https://doi.org/10.1109/glocom.2018.8647941","mag":"2917559515"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2018.8647941","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054433739","display_name":"Haifeng Ke","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haifeng Ke","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjinz, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjinz, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjinz, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjinz, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Software, University of Technology, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100366166","display_name":"Si Chen","orcid":"https://orcid.org/0000-0001-6423-7304"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Si Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjinz, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjinz, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054433739"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.5071,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75627628,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8911593556404114},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7702360153198242},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.7532267570495605},{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-anonymity","score":0.7140218019485474},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6769914031028748},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5762343406677246},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5075122117996216},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.48979806900024414},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.47266945242881775},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43666568398475647},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3776336908340454},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3331397771835327},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08958232402801514}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8911593556404114},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7702360153198242},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.7532267570495605},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.7140218019485474},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6769914031028748},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5762343406677246},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5075122117996216},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.48979806900024414},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.47266945242881775},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43666568398475647},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3776336908340454},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3331397771835327},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08958232402801514}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/glocom.2018.8647941","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/134522","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/134522","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W56293434","https://openalex.org/W1655894887","https://openalex.org/W1873763122","https://openalex.org/W1968752677","https://openalex.org/W1982183556","https://openalex.org/W1985310469","https://openalex.org/W2096803423","https://openalex.org/W2097858741","https://openalex.org/W2119219356","https://openalex.org/W2134479759","https://openalex.org/W2164649498","https://openalex.org/W2417915283","https://openalex.org/W2522626811","https://openalex.org/W2611557754","https://openalex.org/W2625133029","https://openalex.org/W2741740309","https://openalex.org/W2778515813","https://openalex.org/W2808273161","https://openalex.org/W2911978475","https://openalex.org/W2951925211","https://openalex.org/W6602294163","https://openalex.org/W6639246211","https://openalex.org/W6677731512","https://openalex.org/W6683964848","https://openalex.org/W6737205485","https://openalex.org/W6758947373","https://openalex.org/W6764468793"],"related_works":["https://openalex.org/W2073216087","https://openalex.org/W3008871499","https://openalex.org/W2098331493","https://openalex.org/W4315488958","https://openalex.org/W3176515490","https://openalex.org/W3185918024","https://openalex.org/W1992286709","https://openalex.org/W2086526348","https://openalex.org/W4236766161","https://openalex.org/W2184017202"],"abstract_inverted_index":{"The":[0,13,107,160],"rapid":[1],"development":[2],"of":[3,17,23,31,44,58,70,94,109,180],"big":[4,25,45,59],"data":[5,26,52,60,213],"has":[6,61],"brought":[7],"great":[8],"convenience":[9],"to":[10,49,164,194],"human's":[11],"lives.":[12],"circulation":[14],"and":[15,84,100,126,156,170,185,212],"sharing":[16],"information":[18],"are":[19,77],"two":[20,80],"main":[21],"characteristics":[22],"the":[24,29,41,51,55,71,121,139,166,183,191,195],"era.":[27],"However,":[28],"risk":[30],"privacy":[32,53,75,95,111,117,130,210],"leakage":[33],"is":[34,162],"also":[35],"greatly":[36],"increased":[37],"when":[38],"we":[39],"enjoy":[40],"various":[42],"services":[43],"data.":[46],"Therefore,":[47],"how":[48],"protect":[50],"in":[54,66],"complex":[56],"context":[57],"become":[62],"a":[63,113,128,208],"research":[64,81,89],"hotspot":[65],"academic":[67],"circles.":[68],"Most":[69],"current":[72],"researches":[73],"on":[74,133,146],"protection":[76],"divided":[78],"into":[79,152],"fields:":[82],"k-anonymity":[83,99],"differential":[85,110,134],"privacy.":[86],"Some":[87],"existing":[88],"shows":[90],"that":[91,189,203],"traditional":[92],"methods":[93],"protection,":[96],"such":[97],"as":[98],"its":[101],"extension,":[102],"cannot":[103],"achieve":[104,207],"absolutely":[105],"security.":[106],"emergence":[108],"provides":[112],"new":[114,129],"solution":[115],"for":[116,142],"protection.":[118],"We":[119,137,197],"draw":[120],"lessons":[122],"from":[123],"exiting":[124],"work":[125],"propose":[127,138],"method":[131,141],"based":[132,145],"privacy:":[135],"AQ-DP.":[136],"first":[140],"classifying":[143],"quasi-identifiers":[144,151,154,158,169],"sensitive":[147,171],"attributes,":[148],"which":[149],"divide":[150],"associated":[153],"(AQI)":[155],"non-associated":[157],"(NAQI).":[159],"purpose":[161],"not":[163],"lose":[165],"correlation":[167],"between":[168],"attributes.":[172],"Our":[173],"model":[174,205],"AQ-DP":[175],"carries":[176],"out":[177],"random":[178,187],"shuffling":[179],"NAQls.,":[181],"generalizes":[182],"AQIs.,":[184],"adds":[186],"noise":[188],"satisfies":[190],"laplacian":[192],"distribution":[193],"statistics.":[196],"have":[198],"conducted":[199],"extensive":[200],"experiments,":[201],"confirming":[202],"our":[204],"can":[206],"satisfying":[209],"level":[211],"utility.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
