{"id":"https://openalex.org/W1505885263","doi":"https://doi.org/10.1109/isi.2015.7165950","title":"A privacy protection procedure for large scale individual level data","display_name":"A privacy protection procedure for large scale individual level data","publication_year":2015,"publication_date":"2015-05-01","ids":{"openalex":"https://openalex.org/W1505885263","doi":"https://doi.org/10.1109/isi.2015.7165950","mag":"1505885263"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2015.7165950","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2015.7165950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112273421","display_name":"Julius Adebayo","orcid":"https://orcid.org/0009-0006-6590-1303"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Julius Adebayo","raw_affiliation_strings":["Electrical Engineering and Computer Science, Massachusetts Institute of Technology","Computer Science and Artificial Intelligence Laboratory, Electrical Engineering and Computer Science, Massachusetts Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science, Massachusetts Institute of Technology","institution_ids":["https://openalex.org/I63966007"]},{"raw_affiliation_string":"Computer Science and Artificial Intelligence Laboratory, Electrical Engineering and Computer Science, Massachusetts Institute of Technology","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013709154","display_name":"Lalana Kagal","orcid":"https://orcid.org/0000-0001-8469-1993"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lalana Kagal","raw_affiliation_strings":["Electrical Engineering and Computer Science, Massachusetts Institute of Technology","Computer Science and Artificial Intelligence Laboratory, Electrical Engineering and Computer Science, Massachusetts Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science, Massachusetts Institute of Technology","institution_ids":["https://openalex.org/I63966007"]},{"raw_affiliation_string":"Computer Science and Artificial Intelligence Laboratory, Electrical Engineering and Computer Science, Massachusetts Institute of Technology","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112273421"],"corresponding_institution_ids":["https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":0.4314,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74725882,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"93","issue":null,"first_page":"120","last_page":"125"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9721999764442444,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9485999941825867,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7934730052947998},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.7034298777580261},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.689316987991333},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.5376604199409485},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5261159539222717},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.5220922231674194},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.47732219099998474},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4710540473461151},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43765029311180115},{"id":"https://openalex.org/keywords/projection","display_name":"Projection (relational algebra)","score":0.41426604986190796},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32161831855773926},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28949683904647827},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2849145531654358},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12072387337684631}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7934730052947998},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.7034298777580261},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.689316987991333},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.5376604199409485},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5261159539222717},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.5220922231674194},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.47732219099998474},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4710540473461151},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43765029311180115},{"id":"https://openalex.org/C57493831","wikidata":"https://www.wikidata.org/wiki/Q3134666","display_name":"Projection (relational algebra)","level":2,"score":0.41426604986190796},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32161831855773926},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28949683904647827},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2849145531654358},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12072387337684631},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2015.7165950","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2015.7165950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W116185458","https://openalex.org/W163418743","https://openalex.org/W184146824","https://openalex.org/W262970172","https://openalex.org/W1485815177","https://openalex.org/W1487444668","https://openalex.org/W1532741148","https://openalex.org/W1560806732","https://openalex.org/W1569223999","https://openalex.org/W2027913322","https://openalex.org/W2077884493","https://openalex.org/W2085427378","https://openalex.org/W2128476487","https://openalex.org/W2129870696","https://openalex.org/W2134167315","https://openalex.org/W2136114025","https://openalex.org/W2153803020","https://openalex.org/W2159024459","https://openalex.org/W2160553465","https://openalex.org/W2161295120","https://openalex.org/W2164384758","https://openalex.org/W2166445532","https://openalex.org/W2563760868","https://openalex.org/W2613223284","https://openalex.org/W2656219660","https://openalex.org/W2734695534","https://openalex.org/W2769353087","https://openalex.org/W3124102853","https://openalex.org/W3125862264","https://openalex.org/W4301621763","https://openalex.org/W6629093123","https://openalex.org/W6633536100","https://openalex.org/W6661020625","https://openalex.org/W6739908690","https://openalex.org/W6741411955"],"related_works":["https://openalex.org/W1637798125","https://openalex.org/W2367926634","https://openalex.org/W2083944649","https://openalex.org/W4309503015","https://openalex.org/W1982505993","https://openalex.org/W2596305496","https://openalex.org/W1548444773","https://openalex.org/W58529046","https://openalex.org/W2577220285","https://openalex.org/W4386447091"],"abstract_inverted_index":{"We":[0,143],"present":[1],"a":[2,44,81,86,102],"transformation":[3],"procedure":[4,38],"for":[5],"large":[6,170],"scale":[7,171],"individual":[8],"level":[9],"data":[10,14,59,87,100,103],"that":[11,147],"produces":[12],"output":[13],"in":[15,128,161],"which":[16],"no":[17],"linear":[18,41],"combinations":[19],"of":[20,57,89,98,122,135],"the":[21,26,31,48,58,65,68,99,120,163],"resulting":[22],"attributes":[23,29,168],"can":[24],"yield":[25],"original":[27],"sensitive":[28,45,69,94,167],"from":[30,47,169],"transformed":[32],"data.":[33,50,172],"In":[34],"doing":[35],"this,":[36],"our":[37,148],"eliminates":[39],"all":[40,90],"information":[42,91],"regarding":[43],"attribute":[46,107],"input":[49],"The":[51,71],"algorithm":[52,72,150],"combines":[53],"principal":[54],"components":[55],"analysis":[56,97],"set":[60,88],"with":[61],"orthogonal":[62],"projection":[63],"onto":[64],"subspace":[66],"containing":[67],"attribute(s).":[70],"presented":[73],"is":[74,80,110],"motivated":[75],"by":[76,156],"applications":[77],"where":[78],"there":[79],"need":[82],"to":[83,93,113,137,165],"drastically":[84],"`sanitize'":[85],"relating":[92],"attribute(s)":[95],"before":[96],"using":[101],"mining":[104],"algorithm.":[105],"Sensitive":[106],"removal":[108],"(sanitization)":[109],"often":[111],"needed":[112],"prevent":[114],"disparate":[115],"impact":[116],"and":[117,125,141],"discrimination":[118],"on":[119],"basis":[121],"race,":[123],"gender,":[124],"sexual":[126],"orientation":[127],"high":[129],"stakes":[130],"contexts":[131],"such":[132],"as":[133],"determination":[134],"access":[136],"loans,":[138],"credit,":[139],"employment,":[140],"insurance.":[142],"show":[144],"through":[145],"experiments":[146],"proposed":[149],"outperforms":[151],"other":[152],"privacy":[153],"preserving":[154],"techniques":[155],"more":[157],"than":[158],"20":[159],"percent":[160],"lowering":[162],"ability":[164],"reconstruct":[166]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
