{"id":"https://openalex.org/W2061451387","doi":"https://doi.org/10.1109/grc.2013.6740411","title":"GN: A privacy preserving data publishing method based on generalization and noise techniques","display_name":"GN: A privacy preserving data publishing method based on generalization and noise techniques","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W2061451387","doi":"https://doi.org/10.1109/grc.2013.6740411","mag":"2061451387"},"language":"en","primary_location":{"id":"doi:10.1109/grc.2013.6740411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/grc.2013.6740411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Granular Computing (GrC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113060447","display_name":"Yeling Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I135237710","display_name":"Zhejiang Normal University","ror":"https://ror.org/01vevwk45","country_code":"CN","type":"education","lineage":["https://openalex.org/I135237710"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yeling Ma","raw_affiliation_strings":["College of Mathematics, Zhejiang Normal University, Jinhua, China","Coll. of Math./Phys. & Inf. Eng., Zhejiang Normal Univ., Jinhua, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics, Zhejiang Normal University, Jinhua, China","institution_ids":["https://openalex.org/I135237710"]},{"raw_affiliation_string":"Coll. of Math./Phys. & Inf. Eng., Zhejiang Normal Univ., Jinhua, China","institution_ids":["https://openalex.org/I135237710"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091565068","display_name":"Jiyi Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I135237710","display_name":"Zhejiang Normal University","ror":"https://ror.org/01vevwk45","country_code":"CN","type":"education","lineage":["https://openalex.org/I135237710"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiyi Wang","raw_affiliation_strings":["College of Mathematics, Zhejiang Normal University, Jinhua, China","Coll. of Math./Phys. & Inf. Eng., Zhejiang Normal Univ., Jinhua, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics, Zhejiang Normal University, Jinhua, China","institution_ids":["https://openalex.org/I135237710"]},{"raw_affiliation_string":"Coll. of Math./Phys. & Inf. Eng., Zhejiang Normal Univ., Jinhua, China","institution_ids":["https://openalex.org/I135237710"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069521016","display_name":"Jianmin Han","orcid":"https://orcid.org/0000-0002-4053-8409"},"institutions":[{"id":"https://openalex.org/I135237710","display_name":"Zhejiang Normal University","ror":"https://ror.org/01vevwk45","country_code":"CN","type":"education","lineage":["https://openalex.org/I135237710"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianmin Han","raw_affiliation_strings":["College of Mathematics, Zhejiang Normal University, Jinhua, China","Coll. of Math./Phys. & Inf. Eng., Zhejiang Normal Univ., Jinhua, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics, Zhejiang Normal University, Jinhua, China","institution_ids":["https://openalex.org/I135237710"]},{"raw_affiliation_string":"Coll. of Math./Phys. & Inf. Eng., Zhejiang Normal Univ., Jinhua, China","institution_ids":["https://openalex.org/I135237710"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101620024","display_name":"Lixia Wang","orcid":"https://orcid.org/0000-0003-0893-1259"},"institutions":[{"id":"https://openalex.org/I4400573192","display_name":"Xingzhi College Zhejiang Normal University","ror":"https://ror.org/04s14fd24","country_code":null,"type":"education","lineage":["https://openalex.org/I4400573192"]},{"id":"https://openalex.org/I135237710","display_name":"Zhejiang Normal University","ror":"https://ror.org/01vevwk45","country_code":"CN","type":"education","lineage":["https://openalex.org/I135237710"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lixia Wang","raw_affiliation_strings":["Xingzhi College Zhejiang Normal University, Jinhua, China","Xingzhi College Zhejiang Normal University  Jinhua China"],"affiliations":[{"raw_affiliation_string":"Xingzhi College Zhejiang Normal University, Jinhua, China","institution_ids":["https://openalex.org/I135237710","https://openalex.org/I4400573192"]},{"raw_affiliation_string":"Xingzhi College Zhejiang Normal University  Jinhua China","institution_ids":["https://openalex.org/I135237710","https://openalex.org/I4400573192"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113060447"],"corresponding_institution_ids":["https://openalex.org/I135237710"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09224075,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"34","issue":null,"first_page":"219","last_page":"224"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.9347070455551147},{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-anonymity","score":0.801592230796814},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.7289789915084839},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7220430374145508},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.6621912717819214},{"id":"https://openalex.org/keywords/tuple","display_name":"Tuple","score":0.6574731469154358},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.6180465221405029},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.5525927543640137},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4679865837097168},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4594373106956482},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37056031823158264},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.352886438369751},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32917773723602295},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27871784567832947},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.21216171979904175},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18253079056739807},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1627783477306366},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.10891318321228027},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.0950583815574646},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.06611192226409912}],"concepts":[{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.9347070455551147},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.801592230796814},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.7289789915084839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7220430374145508},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.6621912717819214},{"id":"https://openalex.org/C118930307","wikidata":"https://www.wikidata.org/wiki/Q600590","display_name":"Tuple","level":2,"score":0.6574731469154358},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.6180465221405029},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.5525927543640137},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4679865837097168},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4594373106956482},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37056031823158264},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.352886438369751},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32917773723602295},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27871784567832947},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.21216171979904175},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18253079056739807},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1627783477306366},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.10891318321228027},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.0950583815574646},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.06611192226409912},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/grc.2013.6740411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/grc.2013.6740411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Granular Computing (GrC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2077217970","https://openalex.org/W2099519519","https://openalex.org/W2119047901","https://openalex.org/W2119067110","https://openalex.org/W2120582309","https://openalex.org/W2125055259","https://openalex.org/W2134167315","https://openalex.org/W2136114025","https://openalex.org/W2159024459","https://openalex.org/W2161030490"],"related_works":["https://openalex.org/W2741549564","https://openalex.org/W2031844830","https://openalex.org/W2393528873","https://openalex.org/W2898931495","https://openalex.org/W2735807361","https://openalex.org/W2381826434","https://openalex.org/W3206397491","https://openalex.org/W3214359279","https://openalex.org/W2967268087","https://openalex.org/W1666070292"],"abstract_inverted_index":{"Generalization":[0],"is":[1,15],"a":[2,36,54],"popular":[3],"technique":[4],"to":[5,57],"realize":[6],"k-anonymity.":[7],"However,":[8],"when":[9],"the":[10,20,25,32,41,67],"distribution":[11],"of":[12,43],"original":[13],"data":[14,21,27,73],"uneven,":[16],"generalization":[17,44,82],"will":[18],"distort":[19],"greatly,":[22],"which":[23,39],"makes":[24],"anonymous":[26,72],"low":[28],"utility.":[29],"To":[30],"address":[31],"problem,":[33],"we":[34],"propose":[35,53],"GN":[37,62,68],"method,":[38],"limits":[40],"degree":[42],"by":[45],"adding":[46],"noise":[47],"tuples":[48],"during":[49],"anonymization.":[50],"We":[51],"also":[52],"GN-Bottom-up":[55],"algorithm":[56],"achieve":[58],"k-anonymity":[59],"based":[60],"on":[61],"method.":[63,83],"Experiments":[64],"show":[65],"that":[66],"method":[69],"can":[70],"generate":[71],"with":[74],"less":[75],"distortion":[76],"and":[77],"higher":[78],"classification":[79],"accuracy":[80],"than":[81]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
