{"id":"https://openalex.org/W2768573258","doi":"https://doi.org/10.1109/infcomw.2017.8116344","title":"FuzzyDP: Fuzzy-based big data publishing against inquiry attacks","display_name":"FuzzyDP: Fuzzy-based big data publishing against inquiry attacks","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2768573258","doi":"https://doi.org/10.1109/infcomw.2017.8116344","mag":"2768573258"},"language":"en","primary_location":{"id":"doi:10.1109/infcomw.2017.8116344","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2017.8116344","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/FuzzyDP_Fuzzy-based_Big_Data_Publishing_Against_Inquiry_Attacks/20818423","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040772796","display_name":"Youyang Qu","orcid":"https://orcid.org/0000-0002-2944-4647"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Youyang Qu","raw_affiliation_strings":["School of Information Technology, Deakin University, VIC, Australia","School of Information Technology, Deakin University, VIC 3125, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC 3125, Australia#TAB#","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Information Technology, Deakin University, VIC, Australia","School of Information Technology, Deakin University, VIC 3125, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC 3125, Australia#TAB#","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012293028","display_name":"Longxiang Gao","orcid":"https://orcid.org/0000-0002-3026-7537"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Longxiang Gao","raw_affiliation_strings":["School of Information Technology, Deakin University, VIC, Australia","School of Information Technology, Deakin University, VIC 3125, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC 3125, Australia#TAB#","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043665482","display_name":"Sancheng Peng","orcid":"https://orcid.org/0000-0002-0865-3570"},"institutions":[{"id":"https://openalex.org/I186272606","display_name":"Guangdong University of Foreign Studies","ror":"https://ror.org/00fhc9y79","country_code":"CN","type":"education","lineage":["https://openalex.org/I186272606"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sancheng Peng","raw_affiliation_strings":["Cisco School of Informatics, Guangdong University of Foreign Studies, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cisco School of Informatics, Guangdong University of Foreign Studies, Guangzhou, China","institution_ids":["https://openalex.org/I186272606"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, VIC, Australia","School of Information Technology, Deakin University, VIC 3125, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC 3125, Australia#TAB#","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068976123","display_name":"Liang Xiao","orcid":"https://orcid.org/0000-0003-2402-611X"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Xiao","raw_affiliation_strings":["Department of Communication Engineering, Xiamen University, China","Dept. of Commun. Eng., Xiamen Univ., China"],"affiliations":[{"raw_affiliation_string":"Department of Communication Engineering, Xiamen University, China","institution_ids":["https://openalex.org/I191208505"]},{"raw_affiliation_string":"Dept. of Commun. Eng., Xiamen Univ., China","institution_ids":["https://openalex.org/I191208505"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5040772796"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":0.4153,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.73408923,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"7","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.9536806344985962},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7714262008666992},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.7025037407875061},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5843337178230286},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.565908670425415},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5161455869674683},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.516065776348114},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5070102214813232},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.47975242137908936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4682061970233917},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4532131552696228},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4406871497631073},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4311797320842743},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4305819869041443},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.35803255438804626},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19719430804252625},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11886051297187805}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.9536806344985962},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7714262008666992},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.7025037407875061},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5843337178230286},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.565908670425415},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5161455869674683},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.516065776348114},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5070102214813232},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.47975242137908936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4682061970233917},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4532131552696228},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4406871497631073},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4311797320842743},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4305819869041443},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.35803255438804626},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19719430804252625},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11886051297187805},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/infcomw.2017.8116344","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2017.8116344","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30105773","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"pmh:oai:figshare.com:article/20818423","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/FuzzyDP_Fuzzy-based_Big_Data_Publishing_Against_Inquiry_Attacks/20818423","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20818423","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/FuzzyDP_Fuzzy-based_Big_Data_Publishing_Against_Inquiry_Attacks/20818423","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7200000286102295}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1557833142","https://openalex.org/W2019384076","https://openalex.org/W2019704260","https://openalex.org/W2057576485","https://openalex.org/W2081930221","https://openalex.org/W2113792377","https://openalex.org/W2119067110","https://openalex.org/W2128870831","https://openalex.org/W2134167315","https://openalex.org/W2136114025","https://openalex.org/W2312791952","https://openalex.org/W2398364701","https://openalex.org/W2417915283","https://openalex.org/W2506214730","https://openalex.org/W2509467699","https://openalex.org/W2911978475","https://openalex.org/W6758947373"],"related_works":["https://openalex.org/W4241535341","https://openalex.org/W4234819362","https://openalex.org/W4387193529","https://openalex.org/W4304208041","https://openalex.org/W3132022922","https://openalex.org/W4390843517","https://openalex.org/W2795052735","https://openalex.org/W4328005954","https://openalex.org/W2183274686","https://openalex.org/W1978205872"],"abstract_inverted_index":{"Privacy":[0],"issues":[1],"are":[2,22],"confronting":[3],"rapidly":[4],"increasing":[5,15],"challenges":[6],"in":[7,85,105],"this":[8,110],"big":[9],"data":[10,59,117],"era.":[11],"There":[12],"is":[13,75],"an":[14,40],"trend":[16],"that":[17,42],"more":[18],"adversaries":[19],"and":[20,35,100,133],"hackers":[21],"aiming":[23],"at":[24],"individual":[25],"privacy":[26,52,127],"with":[27,57,71],"updated":[28],"technology,":[29],"which":[30,74],"leads":[31],"to":[32,54,82],"financial":[33],"loss":[34],"safety":[36],"issues.":[37],"We":[38],"have":[39],"observation":[41],"existing":[43],"models,":[44],"for":[45],"example,":[46],"classic":[47,120],"differential":[48,86],"privacy,":[49,73],"provide":[50],"certain":[51],"protection":[53],"statistical":[55],"databases":[56],"unsatisfying":[58],"utility.":[60],"Motivated":[61],"by":[62],"this,":[63],"we":[64,94],"propose":[65],"FuzzyDP":[66],"model":[67,114],"using":[68,79],"fuzzy":[69,80],"logic":[70,81],"e-differential":[72],"the":[76,90,97,103,112,125,137,140],"early":[77],"work":[78],"cluster":[83],"datasets":[84,91],"privacy.":[87],"By":[88],"fuzzifying":[89],"into":[92],"clusters,":[93],"can":[95],"reduce":[96],"global":[98],"sensitivity":[99],"therefore":[101],"control":[102],"noise":[104],"a":[106],"satisfying":[107],"level.":[108,128],"In":[109],"way,":[111],"proposed":[113,141],"achieves":[115],"better":[116],"utility":[118],"than":[119],"laplace":[121],"mechanism,":[122],"while":[123],"maintains":[124],"same":[126],"Our":[129],"solid":[130],"theoretical":[131],"analysis":[132],"extensive":[134],"experiments":[135],"prove":[136],"effectiveness":[138],"of":[139],"model.":[142]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
