{"id":"https://openalex.org/W4416078099","doi":"https://doi.org/10.1109/jiot.2025.3630815","title":"Utility-Based Privacy-Preserving Data Mining","display_name":"Utility-Based Privacy-Preserving Data Mining","publication_year":2025,"publication_date":"2025-11-10","ids":{"openalex":"https://openalex.org/W4416078099","doi":"https://doi.org/10.1109/jiot.2025.3630815"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3630815","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3630815","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072078993","display_name":"Qinyong Zhou","orcid":"https://orcid.org/0009-0009-1823-3631"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qingfeng Zhou","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000962921","display_name":"Wensheng Gan","orcid":"https://orcid.org/0000-0002-5781-8116"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wensheng Gan","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083305062","display_name":"Zhenlian Qi","orcid":"https://orcid.org/0009-0005-7484-9124"},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenlian Qi","raw_affiliation_strings":["School of Information Engineering, Guangdong Eco-Engineering Polytechnic, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Guangdong Eco-Engineering Polytechnic, Guangzhou, China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036357902","display_name":"Philip S. Yu","orcid":"https://orcid.org/0000-0002-3491-5968"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Philip S. Yu","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Chicago, Chicago, IL, USA","Department of Computer Science, University of Illinois Chicago, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Chicago, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]},{"raw_affiliation_string":"Department of Computer Science, University of Illinois Chicago, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072078993"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1779672,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"2","first_page":"2067","last_page":"2084"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.539900004863739,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.539900004863739,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.32829999923706055,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.016200000420212746,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5601999759674072},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.49300000071525574},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4722999930381775},{"id":"https://openalex.org/keywords/algorithm-design","display_name":"Algorithm design","score":0.43050000071525574},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4235000014305115},{"id":"https://openalex.org/keywords/efficient-algorithm","display_name":"Efficient algorithm","score":0.3580000102519989},{"id":"https://openalex.org/keywords/information-loss","display_name":"Information loss","score":0.35440000891685486}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8307999968528748},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.7070000171661377},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5601999759674072},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.49300000071525574},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4722999930381775},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.43050000071525574},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4235000014305115},{"id":"https://openalex.org/C3018263672","wikidata":"https://www.wikidata.org/wiki/Q1296251","display_name":"Efficient algorithm","level":2,"score":0.3580000102519989},{"id":"https://openalex.org/C2988416141","wikidata":"https://www.wikidata.org/wiki/Q6031139","display_name":"Information loss","level":2,"score":0.35440000891685486},{"id":"https://openalex.org/C148764684","wikidata":"https://www.wikidata.org/wiki/Q621751","display_name":"Approximation algorithm","level":2,"score":0.3343999981880188},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3124000132083893},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3021000027656555},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.29750001430511475},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.28290000557899475},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2824000120162964},{"id":"https://openalex.org/C149490388","wikidata":"https://www.wikidata.org/wiki/Q1718507","display_name":"Sequential Pattern Mining","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.25459998846054077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3630815","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3630815","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4460898826","display_name":null,"funder_award_id":"62272196","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329228","display_name":"Science Research Foundation of Xijing University","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1972289686","https://openalex.org/W2024134537","https://openalex.org/W2049785083","https://openalex.org/W2064853889","https://openalex.org/W2099398039","https://openalex.org/W2106570511","https://openalex.org/W2125352627","https://openalex.org/W2143428105","https://openalex.org/W2161637667","https://openalex.org/W2406806423","https://openalex.org/W2493805912","https://openalex.org/W2497795595","https://openalex.org/W2508886577","https://openalex.org/W2799540585","https://openalex.org/W2804685987","https://openalex.org/W2900897168","https://openalex.org/W2957505401","https://openalex.org/W3017600317","https://openalex.org/W3111896222","https://openalex.org/W3141915782","https://openalex.org/W3160050484","https://openalex.org/W3177259441","https://openalex.org/W3207258229","https://openalex.org/W4308740912","https://openalex.org/W4313530535","https://openalex.org/W4324125850","https://openalex.org/W4361294313","https://openalex.org/W4372342624","https://openalex.org/W4381194448","https://openalex.org/W4382241569","https://openalex.org/W4382365319","https://openalex.org/W4385270461","https://openalex.org/W4386094585","https://openalex.org/W4386575068","https://openalex.org/W4387971550","https://openalex.org/W4391113940","https://openalex.org/W4391469815","https://openalex.org/W4392769279","https://openalex.org/W4400944304","https://openalex.org/W4401326170","https://openalex.org/W4401878991","https://openalex.org/W4408474295","https://openalex.org/W4412676129"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,23,86,122,125,133,139,163,170,199,222,235,251],"advent":[2],"of":[3,124,165,188,247],"big":[4],"data,":[5],"periodic":[6,76,113,215],"pattern":[7],"mining":[8,62],"has":[9,64],"demonstrated":[10],"significant":[11,44],"value":[12,187],"in":[13,28,50,75],"real-world":[14],"applications,":[15],"including":[16],"smart":[17],"home":[18],"systems,":[19,21],"healthcare":[20],"and":[22,90,100,138,151,258],"medical":[24],"field.":[25],"However,":[26,67],"advances":[27],"network":[29],"technology":[30],"have":[31],"enabled":[32],"malicious":[33],"actors":[34],"to":[35,46,110,161,169],"extract":[36],"sensitive":[37,95,102,112,149,195,214,252],"information":[38,77,147],"from":[39],"publicly":[40,261],"available":[41,262],"datasets,":[42],"posing":[43],"threats":[45],"data":[47,131],"providers":[48],"and,":[49],"severe":[51],"cases,":[52],"hindering":[53],"societal":[54],"development.":[55],"To":[56,79,120],"mitigate":[57],"such":[58],"risks,":[59],"privacy-preserving":[60],"utility":[61],"(PPUM)":[63],"been":[65],"proposed.":[66],"PPUM":[68,88,172,201,223],"is":[69],"unsuitable":[70],"for":[71],"addressing":[72],"privacy":[73],"concerns":[74],"mining.":[78],"address":[80],"this":[81],"issue,":[82],"we":[83,127],"innovatively":[84],"extend":[85],"existing":[87],"framework":[89],"propose":[91],"two":[92,129],"algorithms,":[93,126],"Maximum":[94,101],"Utility-MAximum":[96],"maxPer":[97,104],"item":[98,105],"(MU-MAP)":[99],"Utility-MInimum":[103],"(MU-MIP).":[106],"These":[107],"algorithms":[108,167,181,210,241],"aim":[109],"hide":[111,213],"high-utility":[114],"itemsets":[115,150,216,227,253],"while":[116],"generating":[117],"sanitized":[118],"datasets.":[119],"enhance":[121],"efficiency":[123],"designed":[128],"novel":[130],"structures:":[132],"Sensitive":[134,140],"Itemset":[135],"List":[136,142],"(SISL)":[137],"Item":[141],"(SIL),":[143],"which":[144],"store":[145],"essential":[146],"about":[148],"their":[152],"constituent":[153],"items.":[154],"Moreover,":[155,234],"several":[156],"performance":[157,164],"metrics":[158],"were":[159],"employed":[160],"evaluate":[162],"our":[166,179,209,240],"compared":[168],"state-of-the-art":[171],"algorithms.":[173],"The":[174,256],"experimental":[175],"results":[176,236],"show":[177],"that":[178,208,228,239],"proposed":[180],"achieve":[182],"an":[183],"Artificial":[184],"Cost":[185],"(AC)":[186],"0":[189],"on":[190],"all":[191],"datasets":[192,259],"when":[193],"hiding":[194],"itemsets.":[196],"In":[197],"contrast,":[198],"traditional":[200],"algorithm":[202,224],"yields":[203],"non-zero":[204],"AC.":[205],"This":[206],"indicates":[207],"can":[211],"successfully":[212],"without":[217],"introducing":[218],"misleading":[219],"patterns,":[220],"whereas":[221],"generates":[225],"additional":[226],"may":[229],"interfere":[230],"with":[231],"user":[232],"decision-making.":[233],"also":[237],"reveal":[238],"maintain":[242],"Database":[243],"Utility":[244],"Similarity":[245],"(DUS)":[246],"over":[248],"90%":[249],"after":[250],"are":[254,260],"hidden.":[255],"code":[257],"at":[263],"https://github.com/DSI-Lab1/PPUM.":[264]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-10T00:00:00"}
