{"id":"https://openalex.org/W2901693828","doi":"https://doi.org/10.1109/iscc.2018.8538730","title":"Personalized Privacy-Preserving with high performance: (\u03b1, \u03b5)-anonymity","display_name":"Personalized Privacy-Preserving with high performance: (\u03b1, \u03b5)-anonymity","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2901693828","doi":"https://doi.org/10.1109/iscc.2018.8538730","mag":"2901693828"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2018.8538730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2018.8538730","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016523130","display_name":"Xia Jianfeng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianfeng Xia","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081445180","display_name":"Min Yu","orcid":"https://orcid.org/0000-0003-4371-7864"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Yu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103137421","display_name":"Ying Yang","orcid":"https://orcid.org/0000-0003-0166-1241"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Yang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048745006","display_name":"Hao Jin","orcid":"https://orcid.org/0000-0002-5848-1519"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Jin","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016523130"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.3258,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68626281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"00807","last_page":"00812"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8168348073959351},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.8116235733032227},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7370460033416748},{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-anonymity","score":0.6994781494140625},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.6366450190544128},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5642560720443726},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.5518258810043335},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4665880501270294},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.45058438181877136},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.44418826699256897},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.42744573950767517},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4180907607078552},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4146585762500763},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3702576458454132},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.26945924758911133},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.23524770140647888},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0869600772857666},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08250895142555237}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8168348073959351},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.8116235733032227},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7370460033416748},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.6994781494140625},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.6366450190544128},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5642560720443726},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.5518258810043335},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4665880501270294},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.45058438181877136},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.44418826699256897},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.42744573950767517},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4180907607078552},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4146585762500763},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3702576458454132},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.26945924758911133},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.23524770140647888},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0869600772857666},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08250895142555237},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2018.8538730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2018.8538730","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1526723749","https://openalex.org/W2009331946","https://openalex.org/W2052806235","https://openalex.org/W2059900053","https://openalex.org/W2080844952","https://openalex.org/W2081765373","https://openalex.org/W2132678785","https://openalex.org/W2135581534","https://openalex.org/W2136114025","https://openalex.org/W2159024459","https://openalex.org/W2161030490","https://openalex.org/W2517346953","https://openalex.org/W2534045157","https://openalex.org/W2769743262","https://openalex.org/W2786931969"],"related_works":["https://openalex.org/W2741549564","https://openalex.org/W2393528873","https://openalex.org/W2898931495","https://openalex.org/W4297283167","https://openalex.org/W2735807361","https://openalex.org/W2997142041","https://openalex.org/W2602585395","https://openalex.org/W2941585449","https://openalex.org/W2596138878","https://openalex.org/W3080460547"],"abstract_inverted_index":{"Express":[0],"data":[1,26,86,97,127,137],"contains":[2],"valuable":[3],"information":[4],"that":[5,51],"can":[6],"be":[7],"used":[8],"for":[9,81],"optimizing":[10],"goods":[11],"transporting":[12],"and":[13,28,126,145],"delivering,":[14],"but":[15,110],"it":[16,58],"also":[17,111],"has":[18],"the":[19,96,105,113,140],"risk":[20],"of":[21,43,107,115,142],"individual":[22],"privacy":[23,83],"leakage":[24],"during":[25],"publishing":[27],"analyzing":[29],"especially":[30],"after":[31],"implementing":[32],"real-name":[33],"registration":[34],"policy":[35],"in":[36,66,84],"China.":[37],"Due":[38],"to":[39,53,61,68,138],"some":[40,49],"special":[41],"traits":[42],"express":[44,69,85,116,136],"data,":[45,117],"traditional":[46],"methods":[47],"have":[48],"drawbacks":[50],"failing":[52],"deal":[54],"with":[55,123],"it.":[56],"So":[57],"is":[59,88],"significant":[60],"find":[62],"a":[63,77],"personalized":[64],"privacy-preservation":[65],"regard":[67],"data.":[70],"In":[71],"this":[72,121],"paper,":[73],"we":[74,94,119,131],"innovatively":[75],"propose":[76],"(\u03b1,":[78,108],"\u03b5)-anonymity":[79],"model":[80,122],"protecting":[82],"which":[87,101],"based":[89],"on":[90,134],"Lossy-join.":[91],"After":[92],"anonymizing,":[93],"project":[95],"into":[98],"two":[99],"tables,":[100],"not":[102],"only":[103],"meets":[104],"constraint":[106],"k)-anonymity,":[109],"consider":[112],"characteristics":[114],"meanwhile,":[118],"handle":[120],"high":[124],"performance":[125],"utility.":[128],"At":[129],"last,":[130],"conduct":[132],"experiments":[133],"real-world":[135],"verify":[139],"ability":[141],"our":[143],"approach":[144],"algorithm.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
