{"id":"https://openalex.org/W2092231822","doi":"https://doi.org/10.1109/wocn.2012.6335531","title":"Data perturbation and feature selection in preserving privacy","display_name":"Data perturbation and feature selection in preserving privacy","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W2092231822","doi":"https://doi.org/10.1109/wocn.2012.6335531","mag":"2092231822"},"language":"en","primary_location":{"id":"doi:10.1109/wocn.2012.6335531","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wocn.2012.6335531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055993222","display_name":"Thanveer Jahan","orcid":"https://orcid.org/0000-0002-4464-7653"},"institutions":[{"id":"https://openalex.org/I10874241","display_name":"Jawaharlal Nehru Technological University, Hyderabad","ror":"https://ror.org/002tchr49","country_code":"IN","type":"education","lineage":["https://openalex.org/I10874241"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Thanveer Jahan","raw_affiliation_strings":["JNTU, Hyderabad, Andhra Pradesh, India","JNTU, Hyderabad, A.P"],"affiliations":[{"raw_affiliation_string":"JNTU, Hyderabad, Andhra Pradesh, India","institution_ids":["https://openalex.org/I10874241"]},{"raw_affiliation_string":"JNTU, Hyderabad, A.P","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088531742","display_name":"G. Narsimha","orcid":"https://orcid.org/0000-0002-0143-8122"},"institutions":[{"id":"https://openalex.org/I10874241","display_name":"Jawaharlal Nehru Technological University, Hyderabad","ror":"https://ror.org/002tchr49","country_code":"IN","type":"education","lineage":["https://openalex.org/I10874241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"G. Narsimha","raw_affiliation_strings":["JNTU, Hyderabad, Andhra Pradesh, India","JNTU, Hyderabad, A.P"],"affiliations":[{"raw_affiliation_string":"JNTU, Hyderabad, Andhra Pradesh, India","institution_ids":["https://openalex.org/I10874241"]},{"raw_affiliation_string":"JNTU, Hyderabad, A.P","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009422422","display_name":"C. V. Guru Rao","orcid":"https://orcid.org/0000-0002-9210-6122"},"institutions":[{"id":"https://openalex.org/I121750182","display_name":"National Institute of Technology Warangal","ror":"https://ror.org/017ebfz38","country_code":"IN","type":"education","lineage":["https://openalex.org/I121750182"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. V. Guru Rao","raw_affiliation_strings":["S.R.Engineering College, Warangal, Andhra Pradesh, India","S. R. Engg College, Warangal, A.P"],"affiliations":[{"raw_affiliation_string":"S.R.Engineering College, Warangal, Andhra Pradesh, India","institution_ids":["https://openalex.org/I121750182"]},{"raw_affiliation_string":"S. R. Engg College, Warangal, A.P","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055993222"],"corresponding_institution_ids":["https://openalex.org/I10874241"],"apc_list":null,"apc_paid":null,"fwci":0.4281,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.72722124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11716","display_name":"Random Matrices and Applications","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.7676916122436523},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.7341230511665344},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7331560254096985},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7322378158569336},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5607229471206665},{"id":"https://openalex.org/keywords/id3","display_name":"ID3","score":0.496554434299469},{"id":"https://openalex.org/keywords/matrix-decomposition","display_name":"Matrix decomposition","score":0.47689107060432434},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4685804545879364},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.45001664757728577},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30893778800964355},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.18766680359840393},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1107189953327179}],"concepts":[{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.7676916122436523},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.7341230511665344},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7331560254096985},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7322378158569336},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5607229471206665},{"id":"https://openalex.org/C174599459","wikidata":"https://www.wikidata.org/wiki/Q1054220","display_name":"ID3","level":4,"score":0.496554434299469},{"id":"https://openalex.org/C42355184","wikidata":"https://www.wikidata.org/wiki/Q1361088","display_name":"Matrix decomposition","level":3,"score":0.47689107060432434},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4685804545879364},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.45001664757728577},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30893778800964355},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.18766680359840393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1107189953327179},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C5481197","wikidata":"https://www.wikidata.org/wiki/Q16766476","display_name":"Decision tree learning","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wocn.2012.6335531","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wocn.2012.6335531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W196078335","https://openalex.org/W1500334688","https://openalex.org/W1981961329","https://openalex.org/W1997841190","https://openalex.org/W1999602050","https://openalex.org/W2028796651","https://openalex.org/W2047370889","https://openalex.org/W2060559128","https://openalex.org/W2072026441","https://openalex.org/W2120216197","https://openalex.org/W2128906841","https://openalex.org/W2139979322","https://openalex.org/W2145747124","https://openalex.org/W2147152072","https://openalex.org/W2798909945","https://openalex.org/W6629977554","https://openalex.org/W6679507720"],"related_works":["https://openalex.org/W2782904003","https://openalex.org/W2118633810","https://openalex.org/W2150953077","https://openalex.org/W4226434912","https://openalex.org/W2002598339","https://openalex.org/W2920931670","https://openalex.org/W2133814741","https://openalex.org/W1995410415","https://openalex.org/W3108343813","https://openalex.org/W4312481107"],"abstract_inverted_index":{"Privacy":[0],"Preserving":[1],"plays":[2],"a":[3,30,107,113,123,153],"vital":[4],"role;":[5],"in":[6,16],"designing":[7],"various":[8],"security-related":[9],"data":[10,17,27,58,141,149],"mining":[11,18,142,145],"applications.":[12],"Protecting":[13],"sensitive":[14,37],"information":[15,133],"has":[19],"become":[20],"an":[21],"important":[22],"issue.":[23],"Data":[24],"distortion":[25,59],"or":[26,48],"perturbation":[28],"is":[29,150],"critical":[31],"component,":[32],"widely":[33],"used":[34],"to":[35,42,78,88],"protect":[36],"data.":[38],"Many":[39],"approaches":[40],"try":[41],"preserve":[43,129],"privacy":[44,83,101],"by":[45,49],"adding":[46],"noise":[47],"matrix":[50],"decomposition":[51,65,71,120],"methods.":[52],"In":[53],"this":[54],"paper":[55],"we":[56],"propose":[57],"methods":[60],"such":[61,157],"as":[62,158],"singular":[63,69,118],"value":[64,70,119],"(SVD)":[66],"and":[67,95,98,161],"sparsified":[68,117],"(SSVD)":[72],"technique":[73],"along":[74,121],"with":[75,122,152],"feature":[76,80,124],"selection":[77],"reduce":[79],"space.":[81],"Various":[82],"metrics":[84],"have":[85],"been":[86],"proposed":[87],"measure":[89],"the":[90],"difference":[91],"between":[92],"original":[93],"dataset":[94,97],"distorted":[96],"degree":[99],"of":[100],"protection.":[102],"Our":[103],"experimental":[104],"results":[105],"use":[106],"real":[108],"world":[109],"dataset.":[110],"It":[111],"shows":[112],"feasible":[114],"solution":[115],"using":[116,140],"selection,":[125],"which":[126],"could":[127],"better":[128],"privacy.":[130],"Extracting":[131],"accurate":[132],"from":[134],"datasets":[135],"will":[136],"make":[137],"reasonable":[138],"decisions":[139],"algorithms.":[143],"The":[144],"utility":[146],"on":[147],"perturbed":[148],"tested":[151],"well":[154],"known":[155],"classifiers":[156],"SVM,":[159],"ID3":[160],"C4.5.":[162]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
