{"id":"https://openalex.org/W3188327051","doi":"https://doi.org/10.1109/icc42927.2021.9500401","title":"Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism","display_name":"Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3188327051","doi":"https://doi.org/10.1109/icc42927.2021.9500401","mag":"3188327051"},"language":"en","primary_location":{"id":"doi:10.1109/icc42927.2021.9500401","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500401","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087605515","display_name":"Shahnewaz Karim Sakib","orcid":"https://orcid.org/0000-0002-5043-3061"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shahnewaz Karim Sakib","raw_affiliation_strings":["Iowa State University,USA","Iowa State University, USA"],"affiliations":[{"raw_affiliation_string":"Iowa State University,USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Iowa State University, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018956193","display_name":"George T. Amariucai","orcid":"https://orcid.org/0000-0003-4471-6425"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George T Amariucai","raw_affiliation_strings":["Kansas State University,USA","Kansas State University, USA"],"affiliations":[{"raw_affiliation_string":"Kansas State University,USA","institution_ids":["https://openalex.org/I189590672"]},{"raw_affiliation_string":"Kansas State University, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100719924","display_name":"Yong Guan","orcid":"https://orcid.org/0000-0003-0445-1848"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yong Guan","raw_affiliation_strings":["Iowa State University,USA","Iowa State University, USA"],"affiliations":[{"raw_affiliation_string":"Iowa State University,USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Iowa State University, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087605515"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":0.9518,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.80107877,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.7819933891296387},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7404528856277466},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6923002004623413},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.649456799030304},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6170187592506409},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5700116157531738},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4851118326187134},{"id":"https://openalex.org/keywords/logarithm","display_name":"Logarithm","score":0.46166306734085083},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.4447510540485382},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43638068437576294},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43037763237953186},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4164216220378876},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3747243285179138},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18560317158699036},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.08239215612411499},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.077667236328125}],"concepts":[{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.7819933891296387},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7404528856277466},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6923002004623413},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.649456799030304},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6170187592506409},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5700116157531738},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4851118326187134},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.46166306734085083},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.4447510540485382},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43638068437576294},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43037763237953186},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4164216220378876},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3747243285179138},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18560317158699036},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.08239215612411499},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.077667236328125},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc42927.2021.9500401","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500401","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1574220596","https://openalex.org/W1649611255","https://openalex.org/W1873763122","https://openalex.org/W1987983106","https://openalex.org/W1988828057","https://openalex.org/W2027595342","https://openalex.org/W2060871119","https://openalex.org/W2074503439","https://openalex.org/W2077145963","https://openalex.org/W2090593019","https://openalex.org/W2097151854","https://openalex.org/W2099259603","https://openalex.org/W2122882636","https://openalex.org/W2129681831","https://openalex.org/W2147324825","https://openalex.org/W2167136065","https://openalex.org/W2269413506","https://openalex.org/W2343097824","https://openalex.org/W2515654213","https://openalex.org/W2564029303","https://openalex.org/W2566989010","https://openalex.org/W2744172881","https://openalex.org/W2749457063","https://openalex.org/W2962986088","https://openalex.org/W2964020641","https://openalex.org/W2967916697","https://openalex.org/W2990476308","https://openalex.org/W2994849590","https://openalex.org/W3099542802","https://openalex.org/W3099980085","https://openalex.org/W3101704102","https://openalex.org/W4205228770","https://openalex.org/W6636810011"],"related_works":["https://openalex.org/W189451467","https://openalex.org/W2186955778","https://openalex.org/W2034667130","https://openalex.org/W4297387099","https://openalex.org/W4297324645","https://openalex.org/W3188327051","https://openalex.org/W2115322878","https://openalex.org/W3200727301","https://openalex.org/W3135006341","https://openalex.org/W2949385168"],"abstract_inverted_index":{"Maximal":[0],"leakage":[1,43,111,134,151],"is":[2,70],"usually":[3,76],"defined":[4],"as":[5,50,52],"the":[6,10,16,26,32,47,53,57,64,85,95,103,136,142,167,173],"logarithmic":[7],"increment":[8],"in":[9,122],"adversary\u2019s":[11],"probability":[12,55],"of":[13,25,41,56,84,94],"correctly":[14],"guessing":[15],"legitimate":[17,33],"user\u2019s":[18,34],"private":[19,27],"data,":[20,28,59,97],"or":[21],"some":[22],"arbitrary":[23],"function":[24],"when":[29,135],"presented":[30],"with":[31],"publicly":[35],"disclosed":[36,96],"information.":[37],"However,":[38],"this":[39,68,108,120,123],"definition":[40],"maximal":[42,110,149,153],"implicitly":[44],"assumes":[45],"that":[46,171],"privacy":[48,87,143,169],"mechanism,":[49,88],"well":[51],"prior":[54],"original":[58],"are":[60],"entirely":[61],"known":[62],"to":[63,79,165],"attacker.":[65],"In":[66,107],"reality,":[67],"assumption":[69],"often":[71],"impractical.":[72],"The":[73],"attacker":[74,137],"can":[75,101],"have":[77],"access":[78,102],"only":[80],"an":[81,115],"approximate":[82],"version":[83],"correct":[86],"computed":[89],"from":[90],"a":[91,158],"limited":[92],"set":[93],"for":[98,132],"which":[99],"she":[100],"corresponding":[104],"un-distorted":[105],"data.":[106],"scenario,":[109,161],"no":[112],"longer":[113],"has":[114,138],"operational":[116],"meaning.":[117],"To":[118],"address":[119],"problem,":[121],"paper,":[124],"we":[125,146,162],"propose":[126],"two":[127],"novel":[128],"meaningful":[129],"information-theoretic":[130],"metrics":[131],"information":[133,140,175],"incomplete":[139],"about":[141],"mechanism":[144,170],"\u2013":[145],"call":[147],"them":[148],"subjective":[150],"and":[152],"objective":[154],"leakage,":[155],"respectively.":[156],"For":[157],"simple,":[159],"binary":[160],"demonstrate":[163],"how":[164],"find":[166],"optimal":[168],"minimizes":[172],"system\u2019s":[174],"leakages.":[176]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
