{"id":"https://openalex.org/W2490345493","doi":"https://doi.org/10.1109/icc.2016.7511227","title":"Democratic Privacy: A protocol-hidden perturbation scheme for pervasive computing","display_name":"Democratic Privacy: A protocol-hidden perturbation scheme for pervasive computing","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2490345493","doi":"https://doi.org/10.1109/icc.2016.7511227","mag":"2490345493"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2016.7511227","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2016.7511227","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023185891","display_name":"Shunsuke Aoki","orcid":"https://orcid.org/0000-0002-3331-2778"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]},{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP","US"],"is_corresponding":true,"raw_author_name":"Shunsuke Aoki","raw_affiliation_strings":["Center for Spatial Information Science, The University of Tokyo","Electrical and Computer Engineering, Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Center for Spatial Information Science, The University of Tokyo","institution_ids":["https://openalex.org/I74801974"]},{"raw_affiliation_string":"Electrical and Computer Engineering, Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050720322","display_name":"Kaoru Sezaki","orcid":"https://orcid.org/0000-0003-1194-4632"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kaoru Sezaki","raw_affiliation_strings":["Center for Spatial Information Science, The University of Tokyo"],"affiliations":[{"raw_affiliation_string":"Center for Spatial Information Science, The University of Tokyo","institution_ids":["https://openalex.org/I74801974"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023185891"],"corresponding_institution_ids":["https://openalex.org/I74801974","https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0427374,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7750333547592163},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6777285933494568},{"id":"https://openalex.org/keywords/participatory-sensing","display_name":"Participatory sensing","score":0.6097608804702759},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49855661392211914},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44324713945388794},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.43542930483818054},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4220714271068573},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.13066476583480835},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.12946319580078125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7750333547592163},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6777285933494568},{"id":"https://openalex.org/C2779208394","wikidata":"https://www.wikidata.org/wiki/Q7140460","display_name":"Participatory sensing","level":2,"score":0.6097608804702759},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49855661392211914},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44324713945388794},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.43542930483818054},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4220714271068573},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.13066476583480835},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.12946319580078125}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2016.7511227","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2016.7511227","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W41288278","https://openalex.org/W1873763122","https://openalex.org/W1963651427","https://openalex.org/W1981093903","https://openalex.org/W1997219441","https://openalex.org/W2013823004","https://openalex.org/W2049298087","https://openalex.org/W2052333713","https://openalex.org/W2063769785","https://openalex.org/W2074968817","https://openalex.org/W2111081327","https://openalex.org/W2159024459","https://openalex.org/W2170711577","https://openalex.org/W3037406573","https://openalex.org/W3121542555"],"related_works":["https://openalex.org/W2368710903","https://openalex.org/W2772112465","https://openalex.org/W4386360526","https://openalex.org/W4387918499","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2786267942","https://openalex.org/W2769254131","https://openalex.org/W2091556092"],"abstract_inverted_index":{"Privacy":[0,188],"issue":[1,27],"has":[2],"become":[3],"serious":[4],"in":[5],"the":[6,26,43,66,69,72,83,88,94,111,117,126,136,143,146,153,168],"area":[7],"of":[8,145,167,178,182],"mobile":[9],"participatory":[10],"sensing,":[11],"smart":[12],"grids,":[13],"location-based":[14],"services,":[15],"and":[16,56,71,135,173],"intelligent":[17],"transportation":[18],"systems.":[19],"In":[20,31,91,123,158],"response,":[21],"many":[22],"researchers":[23],"are":[24,40,45,139],"tackling":[25],"with":[28,104,120],"technical":[29],"approaches.":[30],"particular,":[32],"data":[33,39,51,61,86,113,138],"perturbation":[34,62,99,118,127],"schemes,":[35],"where":[36],"all":[37],"sensor":[38,85],"processed":[41],"on":[42,142],"user-side,":[44],"prospective":[46],"techniques":[47],"for":[48,170,193],"utilizing":[49],"personal":[50],"collected":[52],"by":[53,132,156,176],"embedded":[54],"systems":[55],"sensor-equipped":[57],"devices.":[58],"However,":[59],"existing":[60],"schemes":[63],"require":[64],"sharing":[65,116],"protocol":[67,119,128],"between":[68],"user-side":[70],"server-side,":[73],"even":[74],"though":[75],"this":[76,92,160],"can":[77,109],"allow":[78],"malicious":[79,149],"attackers":[80,150],"to":[81],"estimate":[82],"original":[84,112,137],"from":[87],"perturbed":[89],"data.":[90],"context,":[93],"paper":[95,161],"presents":[96,162],"a":[97,106,190],"protocol-hidden":[98],"framework,":[100],"called":[101],"Democratic":[102,124,171,187],"Privacy,":[103,125,172],"which":[105],"service":[107],"provider":[108],"acquire":[110],"probability":[114],"without":[115],"each":[121,133],"user.":[122],"is":[129],"selected":[130],"dramatically":[131],"user,":[134],"reconstructed":[140],"based":[141],"selection":[144],"crowd.":[147],"Consequently,":[148],"cannot":[151],"distinguish":[152],"individual":[154],"settings":[155],"eavesdropping.":[157],"addition,":[159],"Three-level":[163],"Perturbation":[164],"as":[165],"one":[166],"methods":[169],"evaluates":[174],"it":[175],"means":[177],"simulations.":[179],"The":[180],"results":[181],"our":[183],"evaluation":[184],"demonstrate":[185],"that":[186],"provides":[189],"secure":[191],"platform":[192],"pervasive":[194],"computing":[195],"environments.":[196]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
