{"id":"https://openalex.org/W4293053897","doi":"https://doi.org/10.1142/s1793962323500174","title":"Privacy protection model considering privacy-utility trade-off for data publishing of weighted social networks based on MST-clustering and sub-graph generalization","display_name":"Privacy protection model considering privacy-utility trade-off for data publishing of weighted social networks based on MST-clustering and sub-graph generalization","publication_year":2022,"publication_date":"2022-05-20","ids":{"openalex":"https://openalex.org/W4293053897","doi":"https://doi.org/10.1142/s1793962323500174"},"language":"en","primary_location":{"id":"doi:10.1142/s1793962323500174","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793962323500174","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006382060","display_name":"Zong\u2010chang Yang","orcid":"https://orcid.org/0000-0002-2999-9204"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zong-Chang Yang","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China","School of Information and Electrical Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"School of Information and Electrical Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088149098","display_name":"Kuang Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Kuang","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China","School of Information and Electrical Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"School of Information and Electrical Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100744755","display_name":"Jianxun Liu","orcid":"https://orcid.org/0000-0003-0722-152X"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian-Xun Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China","School of Information and Electrical Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"School of Information and Electrical Engineering, Hunan University of Science and Technology, Xiangtan 411201, P. R. China","institution_ids":["https://openalex.org/I121296143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006382060"],"corresponding_institution_ids":["https://openalex.org/I121296143"],"apc_list":null,"apc_paid":null,"fwci":1.1369,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83353968,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"14","issue":"04","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.7397485971450806},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7394419312477112},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7255322337150574},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5835915803909302},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5554559230804443},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.53082674741745},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5016312599182129},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.48098933696746826},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37034013867378235},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33691567182540894},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.24197012186050415},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17020675539970398},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15713798999786377}],"concepts":[{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.7397485971450806},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7394419312477112},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7255322337150574},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5835915803909302},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5554559230804443},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.53082674741745},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5016312599182129},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.48098933696746826},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37034013867378235},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33691567182540894},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.24197012186050415},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17020675539970398},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15713798999786377},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s1793962323500174","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793962323500174","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1214925366","display_name":null,"funder_award_id":"2013GK3090","funder_id":"https://openalex.org/F4320321471","funder_display_name":"Hunan Provincial Science and Technology Department"}],"funders":[{"id":"https://openalex.org/F4320321471","display_name":"Hunan Provincial Science and Technology Department","ror":"https://ror.org/04qgr7x96"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W132853672","https://openalex.org/W1965680834","https://openalex.org/W1971601202","https://openalex.org/W1972969203","https://openalex.org/W1984370829","https://openalex.org/W1985749074","https://openalex.org/W2017927472","https://openalex.org/W2050215574","https://openalex.org/W2072556051","https://openalex.org/W2075915611","https://openalex.org/W2107645850","https://openalex.org/W2135838082","https://openalex.org/W2148443742","https://openalex.org/W2164503131","https://openalex.org/W2237766309","https://openalex.org/W2293626007"],"related_works":["https://openalex.org/W2075445622","https://openalex.org/W2185528434","https://openalex.org/W2061451387","https://openalex.org/W3015404069","https://openalex.org/W2602585395","https://openalex.org/W136304283","https://openalex.org/W2953940317","https://openalex.org/W3022534164","https://openalex.org/W4385611918","https://openalex.org/W2051608311"],"abstract_inverted_index":{"Along":[0],"with":[1],"the":[2,6,25,32,35,59,61,66,69,72,84,89,97,135,144,147,153,157,164,181,185,195,199,206,212,221],"rapid":[3],"development":[4],"of":[5,19,34,68,74,130,143,159,184,194,211],"Internet":[7],"technology,":[8],"social":[9,112],"network":[10],"sites":[11],"(SNSs)":[12],"are":[13,21,48,150,170],"increasingly":[14],"emerging.":[15],"As":[16],"various":[17],"types":[18],"datasets":[20],"easily":[22],"exposed":[23],"to":[24,179],"network,":[26],"privacy":[27,55,62,102,203],"security":[28],"in":[29,51,58,110,152,172],"SNS":[30],"becomes":[31,77],"focus":[33],"study.":[36],"Anonymization":[37],"techniques,":[38],"such":[39],"as":[40,127],"generalization":[41,99,168,214],"and":[42,44,87,96,121,189,232],"bucketization,":[43],"data":[45,52,108,177,207,222,228],"perturbation":[46],"techniques":[47],"usually":[49],"employed":[50],"publishing":[53,109,178,208],"for":[54,107,176,205,225],"protection.":[56],"However,":[57],"meanwhile,":[60],"protection":[63,103,204],"methods":[64],"reduce":[65],"utility":[67,223],"data.":[70],"Thus,":[71],"issue":[73],"privacy-utility":[75,85,182],"trade-off":[76,86,183],"one":[78,119,128,173],"very":[79],"real":[80],"problem.":[81],"By":[82],"considering":[83],"combining":[88],"minimum":[90,136],"spanning":[91,138],"tree":[92],"(MST)":[93],"clustering":[94,116,124],"technique":[95],"sub-graph":[98,167,213],"technique,":[100],"a":[101],"model":[104,201],"is":[105,118,134],"proposed":[106,186,196,200],"weighted":[111],"networks.":[113],"The":[114],"MST-based":[115],"method":[117,197],"representative":[120],"concise":[122],"graph-based":[123],"algorithm.":[125],"Meanwhile,":[126],"MST":[129],"an":[131],"edge-weighted":[132],"graph":[133,145],"weight":[137],"tree,":[139],"some":[140],"important":[141],"properties":[142],"like":[146,227],"shortest":[148],"path":[149],"preserved":[151],"MST.":[154],"Finally,":[155],"on":[156],"basis":[158],"sub-graphs":[160],"(clusters)":[161],"divided":[162],"by":[163,209],"MST-clustering,":[165],"three":[166],"approaches":[169],"designed":[171],"reasonable":[174],"way":[175],"guarantee":[180],"method.":[187],"Experiments":[188],"result":[190],"analysis":[191],"indicate":[192],"workability":[193],"that":[198],"offers":[202],"means":[210],"approach":[215],"while":[216],"it":[217],"can":[218],"also":[219],"improve":[220],"especially":[224],"occasions":[226],"mining,":[229],"machine":[230],"learning,":[231],"pattern":[233],"recognition.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
