{"id":"https://openalex.org/W2168660632","doi":"https://doi.org/10.1109/iri.2009.5211646","title":"A pioneering Cryptic Random Projection based approach for privacy preserving data mining","display_name":"A pioneering Cryptic Random Projection based approach for privacy preserving data mining","publication_year":2009,"publication_date":"2009-08-01","ids":{"openalex":"https://openalex.org/W2168660632","doi":"https://doi.org/10.1109/iri.2009.5211646","mag":"2168660632"},"language":"en","primary_location":{"id":"doi:10.1109/iri.2009.5211646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iri.2009.5211646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Information Reuse &amp; Integration","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101964057","display_name":"K. Murugesan","orcid":"https://orcid.org/0000-0001-5355-9340"},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K. Murugesan","raw_affiliation_strings":["Department of Computer Science and Engineering, Anna University, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Anna University, Chennai, India","institution_ids":["https://openalex.org/I33585257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032529993","display_name":"Muhammad Rukunuddin Ghalib","orcid":"https://orcid.org/0000-0002-2786-3370"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Md. Rukunuddin Ghalib","raw_affiliation_strings":["Department of Information Technology, Vellore of Institute of Technology, Vellore, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Vellore of Institute of Technology, Vellore, Tamil Nadu, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039402086","display_name":"J. Gitanjali","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"J. Gitanjali","raw_affiliation_strings":["Department of Information Technology, Vellore of Institute of Technology, Vellore, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Vellore of Institute of Technology, Vellore, Tamil Nadu, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080679849","display_name":"J. Indumathi","orcid":"https://orcid.org/0000-0003-4673-6710"},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"J. Indumathi","raw_affiliation_strings":["Department of Computer Science and Engineering, Anna University, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Anna University, Chennai, India","institution_ids":["https://openalex.org/I33585257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109245174","display_name":"D. Manjula","orcid":null},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. Manjula","raw_affiliation_strings":["Department of Computer Science and Engineering, Anna University, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Anna University, Chennai, India","institution_ids":["https://openalex.org/I33585257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101964057"],"corresponding_institution_ids":["https://openalex.org/I33585257"],"apc_list":null,"apc_paid":null,"fwci":0.3236,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6487836,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"2","issue":null,"first_page":"437","last_page":"439"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-projection","display_name":"Random projection","score":0.8117513656616211},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.708867609500885},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6817805767059326},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6502701044082642},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5378723740577698},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5345484614372253},{"id":"https://openalex.org/keywords/projection","display_name":"Projection (relational algebra)","score":0.46824586391448975},{"id":"https://openalex.org/keywords/random-matrix","display_name":"Random matrix","score":0.458008736371994},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40165597200393677},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39595481753349304},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31203603744506836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10867387056350708}],"concepts":[{"id":"https://openalex.org/C2777036070","wikidata":"https://www.wikidata.org/wiki/Q18393452","display_name":"Random projection","level":2,"score":0.8117513656616211},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.708867609500885},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6817805767059326},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6502701044082642},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5378723740577698},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5345484614372253},{"id":"https://openalex.org/C57493831","wikidata":"https://www.wikidata.org/wiki/Q3134666","display_name":"Projection (relational algebra)","level":2,"score":0.46824586391448975},{"id":"https://openalex.org/C64812099","wikidata":"https://www.wikidata.org/wiki/Q176604","display_name":"Random matrix","level":3,"score":0.458008736371994},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40165597200393677},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39595481753349304},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31203603744506836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10867387056350708},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iri.2009.5211646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iri.2009.5211646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Information Reuse &amp; Integration","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1482260876","https://openalex.org/W1519148939","https://openalex.org/W1548578223","https://openalex.org/W2041836310","https://openalex.org/W2053171205","https://openalex.org/W2107879335","https://openalex.org/W2144709747","https://openalex.org/W2157928485","https://openalex.org/W2159226073","https://openalex.org/W2162585663","https://openalex.org/W2170679573","https://openalex.org/W6629032066","https://openalex.org/W6683347979"],"related_works":["https://openalex.org/W1980222719","https://openalex.org/W2806825636","https://openalex.org/W1970024574","https://openalex.org/W2064168458","https://openalex.org/W4287750422","https://openalex.org/W3037895282","https://openalex.org/W1974904686","https://openalex.org/W3092235791","https://openalex.org/W2592293938","https://openalex.org/W2033523051"],"abstract_inverted_index":{"Privacy":[0],"is":[1,26],"the":[2,22,29,42,51,64,82,92,97,104,112,126],"most":[3],"important":[4],"apprehension":[5],"in":[6,28,76],"many":[7],"data":[8,84,101,108,132],"mining":[9],"applications.":[10],"In":[11],"this":[12,33],"paper":[13],"a":[14,77],"new":[15,78],"technique":[16],"called":[17,67],"Cryptic":[18],"Random":[19],"Projection,":[20],"solves":[21],"re-identification":[23,98],"quandary":[24],"(which":[25],"found":[27],"conventional":[30],"random":[31,36,45,52,60,65,71],"projections).Here":[32],"encryption":[34],"based":[35],"projection":[37],"assigns":[38],"secret":[39],"keys":[40],"to":[41,50,125],"positions":[43],"of":[44,59,99],"matrix":[46],"elements":[47],"and":[48,69,73,107,121,134],"not":[49],"numbers.":[53],"We":[54,88,110],"have":[55,89],"addressed":[56],"two":[57],"kinds":[58],"sequences":[61,66,72],"for":[62,118],"generating":[63],"determinist":[68],"indeterminist":[70],"encrypted":[74],"it":[75],"way":[79,117],"so":[80],"that":[81],"original":[83,100],"cannot":[85],"be":[86],"re-identified.":[87],"also":[90],"optimized":[91],"privacy":[93],"level":[94],"which":[95],"toughens":[96],"without":[102],"compromising":[103],"processing":[105],"speed":[106],"utility.":[109],"hope":[111],"projected":[113],"solution":[114],"will":[115],"tarmac":[116],"investigation":[119],"track":[120],"toil":[122],"well":[123],"according":[124],"evaluation":[127],"metrics":[128],"including":[129],"hiding":[130],"effects,":[131],"utility,":[133],"time":[135],"performance.":[136]},"counts_by_year":[{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
