{"id":"https://openalex.org/W2992469433","doi":"https://doi.org/10.1109/icawst.2019.8923378","title":"A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data","display_name":"A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2992469433","doi":"https://doi.org/10.1109/icawst.2019.8923378","mag":"2992469433"},"language":"en","primary_location":{"id":"doi:10.1109/icawst.2019.8923378","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icawst.2019.8923378","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108246380","display_name":"Eina Hashimoto","orcid":null},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Eina hashimoto","raw_affiliation_strings":["Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109357910","display_name":"Masatsugu Ichino","orcid":null},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masatsugu Ichino","raw_affiliation_strings":["Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102184319","display_name":"Hiroshi Yoshiura","orcid":null},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroshi Yoshiura","raw_affiliation_strings":["Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108246380"],"corresponding_institution_ids":["https://openalex.org/I20529979"],"apc_list":null,"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58874092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/unavailability","display_name":"Unavailability","score":0.874065637588501},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7599351406097412},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.7364044785499573},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6070945858955383},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5254149436950684},{"id":"https://openalex.org/keywords/obstacle","display_name":"Obstacle","score":0.5213490724563599},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.49511995911598206},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4679998755455017},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4525824785232544},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38957011699676514},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38330063223838806},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3726579248905182},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36170512437820435},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3367269039154053},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11584451794624329}],"concepts":[{"id":"https://openalex.org/C2780505938","wikidata":"https://www.wikidata.org/wiki/Q17093282","display_name":"Unavailability","level":2,"score":0.874065637588501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7599351406097412},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.7364044785499573},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6070945858955383},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5254149436950684},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.5213490724563599},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.49511995911598206},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4679998755455017},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4525824785232544},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38957011699676514},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38330063223838806},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3726579248905182},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36170512437820435},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3367269039154053},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11584451794624329},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icawst.2019.8923378","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icawst.2019.8923378","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W9292421","https://openalex.org/W184758014","https://openalex.org/W1973980096","https://openalex.org/W2013863451","https://openalex.org/W2018277822","https://openalex.org/W2025602051","https://openalex.org/W2077414053","https://openalex.org/W2091573475","https://openalex.org/W2116179650","https://openalex.org/W2120911939","https://openalex.org/W2171654742","https://openalex.org/W2345561840","https://openalex.org/W2394654094","https://openalex.org/W2541018429","https://openalex.org/W2604609353","https://openalex.org/W2765830915","https://openalex.org/W2896041560","https://openalex.org/W2963224817","https://openalex.org/W6600376888","https://openalex.org/W6607443979"],"related_works":["https://openalex.org/W4237235066","https://openalex.org/W2026539069","https://openalex.org/W207884067","https://openalex.org/W3127016596","https://openalex.org/W2365973415","https://openalex.org/W3146085540","https://openalex.org/W1482423459","https://openalex.org/W2996457675","https://openalex.org/W2129918226","https://openalex.org/W843992174"],"abstract_inverted_index":{"Data":[0],"on":[1,125,139],"people's":[2],"daily":[3],"activities":[4],"are":[5,97,107],"being":[6],"collected":[7],"as":[8,141],"big":[9],"data":[10,32,52,55,76,96,105,216],"and":[11,16,77,111,149,159,186,217],"then":[12],"mined":[13],"for":[14,112],"corporate":[15],"public":[17],"purposes.":[18],"However,":[19],"concern":[20],"about":[21],"privacy":[22,37,211],"is":[23,117],"the":[24,36,50,65,73,78,81,114,126,129,146,153,156,166,176,190,194,210,221],"major":[25],"obstacle":[26],"to":[27,99,109,119,171,178,220],"using":[28,90,137,214],"such":[29],"data.":[30,83,143],"Although":[31],"anonymisation":[33],"can":[34,44],"mitigate":[35],"risk,":[38],"researchers":[39],"have":[40,85],"shown":[41],"that":[42,106],"people":[43,205],"often":[45],"be":[46,206],"re-identified":[47],"by":[48,64,136,151],"linking":[49],"anonymised":[51,95],"with":[53,162],"other":[54],"(i.e.":[56],"side":[57,82,104,142],"data).":[58],"Though":[59],"re-identification":[60,88,127],"has":[61],"been":[62],"improved":[63,224],"use":[66],"of":[67,75,80,103,128,131,155,175,189,209,213,223],"machine":[68,91],"learning,":[69],"two":[70],"problems":[71],"remain:":[72],"unavailability":[74],"inappropriateness":[79],"We":[84,121,144,168],"developed":[86],"a":[87,100],"strategy":[89,124,202],"learning":[92],"in":[93,165],"which":[94,113],"linked":[98,145],"different":[101],"type":[102],"easy":[108,118],"obtain":[110],"represented":[115],"person":[116],"identify.":[120],"tested":[122],"our":[123],"owners":[130,158,180],"78":[132],"anonymous":[133],"Twitter":[134,147],"accounts":[135,177,191],"information":[138],"r\u00e9sum\u00e9s":[140,150],"posts":[148],"estimating":[152],"profiles":[154],"account":[157],"matching":[160],"them":[161],"those":[163],"described":[164],"r\u00e9sum\u00e9s.":[167],"were":[169,184,198],"able":[170],"link":[172],"roughly":[173,187],"50%":[174],"their":[179],"when":[181,192],"all":[182],"tweets":[183,197],"used":[185],"20%":[188],"only":[193],"latest":[195],"63":[196],"used.":[199],"The":[200],"proposed":[201],"would":[203],"help":[204],"better":[207],"aware":[208],"risks":[212],"personal":[215],"hopefully":[218],"lead":[219],"implementation":[222],"protection":[225],"measures.":[226]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
