{"id":"https://openalex.org/W2022079499","doi":"https://doi.org/10.1145/1066157.1066163","title":"Deriving private information from randomized data","display_name":"Deriving private information from randomized data","publication_year":2005,"publication_date":"2005-06-14","ids":{"openalex":"https://openalex.org/W2022079499","doi":"https://doi.org/10.1145/1066157.1066163","mag":"2022079499"},"language":"en","primary_location":{"id":"doi:10.1145/1066157.1066163","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1066157.1066163","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM SIGMOD international conference on Management of data","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075148727","display_name":"Zhengli Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhengli Huang","raw_affiliation_strings":["Syracuse University, Syracuse, NY"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047825382","display_name":"Wenliang Du","orcid":"https://orcid.org/0000-0002-9234-0912"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenliang Du","raw_affiliation_strings":["Syracuse University, Syracuse, NY"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100458392","display_name":"Biao Chen","orcid":"https://orcid.org/0000-0002-3559-2515"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Biao Chen","raw_affiliation_strings":["Syracuse University, Syracuse, NY"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY","institution_ids":["https://openalex.org/I70983195"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075148727"],"corresponding_institution_ids":["https://openalex.org/I70983195"],"apc_list":null,"apc_paid":null,"fwci":38.8517,"has_fulltext":false,"cited_by_count":412,"citation_normalized_percentile":{"value":0.99843814,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11716","display_name":"Random Matrices and Applications","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7007251977920532},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6012870073318481},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.5920434594154358},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.5810588598251343},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.557033360004425},{"id":"https://openalex.org/keywords/randomization","display_name":"Randomization","score":0.5475635528564453},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.49849796295166016},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44084984064102173},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.378254771232605},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3261861205101013},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15009388327598572},{"id":"https://openalex.org/keywords/randomized-controlled-trial","display_name":"Randomized controlled trial","score":0.14894619584083557}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7007251977920532},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6012870073318481},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.5920434594154358},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.5810588598251343},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.557033360004425},{"id":"https://openalex.org/C204243189","wikidata":"https://www.wikidata.org/wiki/Q1363085","display_name":"Randomization","level":3,"score":0.5475635528564453},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.49849796295166016},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44084984064102173},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.378254771232605},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3261861205101013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15009388327598572},{"id":"https://openalex.org/C168563851","wikidata":"https://www.wikidata.org/wiki/Q1436668","display_name":"Randomized controlled trial","level":2,"score":0.14894619584083557},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C141071460","wikidata":"https://www.wikidata.org/wiki/Q40821","display_name":"Surgery","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/1066157.1066163","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1066157.1066163","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM SIGMOD international conference on Management of data","raw_type":"proceedings-article"},{"id":"pmh:oai:surface.syr.edu:eecs-1009","is_oa":false,"landing_page_url":"https://surface.syr.edu/eecs/10","pdf_url":null,"source":{"id":"https://openalex.org/S4306401700","display_name":"Syracuse University Libraries (Syracuse University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I70983195","host_organization_name":"Syracuse University","host_organization_lineage":["https://openalex.org/I70983195"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Electrical Engineering and Computer Science - All Scholarship","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.1003.3416","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1003.3416","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://surface.syr.edu/cgi/viewcontent.cgi?article%3D1009%26context%3Deecs","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.80.4395","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.4395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cis.syr.edu/~wedu/Research/paper/privacy_sigmod05.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2567833","https://openalex.org/W1484075742","https://openalex.org/W1495297318","https://openalex.org/W1503506375","https://openalex.org/W1510952750","https://openalex.org/W1528076390","https://openalex.org/W1574217375","https://openalex.org/W1575701986","https://openalex.org/W1590772317","https://openalex.org/W1968265138","https://openalex.org/W1969019410","https://openalex.org/W1999602050","https://openalex.org/W2001336960","https://openalex.org/W2002352982","https://openalex.org/W2013823004","https://openalex.org/W2060559128","https://openalex.org/W2078937669","https://openalex.org/W2079428063","https://openalex.org/W2093367651","https://openalex.org/W2128906841","https://openalex.org/W2130099852","https://openalex.org/W2134149606","https://openalex.org/W2139336600","https://openalex.org/W2141625084","https://openalex.org/W2148694408","https://openalex.org/W2152131375","https://openalex.org/W2161067131","https://openalex.org/W2163599171","https://openalex.org/W2164341199","https://openalex.org/W2492526546","https://openalex.org/W2561675875","https://openalex.org/W3036935753","https://openalex.org/W4248358572","https://openalex.org/W4292023222","https://openalex.org/W4298870207","https://openalex.org/W6631628602","https://openalex.org/W6634400866"],"related_works":["https://openalex.org/W1975632186","https://openalex.org/W3027745756","https://openalex.org/W2531880140","https://openalex.org/W3205213561","https://openalex.org/W2036609560","https://openalex.org/W346861917","https://openalex.org/W3024018414","https://openalex.org/W385273440","https://openalex.org/W4380081032","https://openalex.org/W2596305496"],"abstract_inverted_index":{"Randomization":[0],"has":[1],"emerged":[2],"as":[3,218],"a":[4,21,54,184],"useful":[5],"technique":[6],"for":[7],"data":[8,12,71,98,105,137,152,167],"disguising":[9],"in":[10,20,188],"privacy-preserving":[11],"mining.":[13],"Its":[14],"privacy":[15,61],"properties":[16],"have":[17,72,127,157,204],"been":[18],"studied":[19],"number":[22],"of":[23,64,70,75,142,194,210],"papers.":[24],"Kargupta":[25],"et":[26],"al.":[27],"challenged":[28],"the":[29,60,65,87,91,110,117,121,134,140,161,165,192,199,207,219],"randomization":[30,37,186],"schemes,":[31],"and":[32,67,116,130,139,213],"they":[33,58,82],"pointed":[34],"out":[35],"that":[36,86,101,145,159,206],"might":[38],"not":[39],"be":[40,147,169,178],"able":[41],"to":[42,198],"preserve":[43],"privacy.":[44],"However,":[45],"it":[46],"is":[47,90],"still":[48],"unclear":[49],"what":[50,68],"factors":[51],"cause":[52],"such":[53],"security":[55],"breach,":[56],"how":[57],"affect":[59],"preserving":[62],"property":[63],"randomization,":[66],"kinds":[69],"higher":[73],"risk":[74],"disclosing":[76],"their":[77],"private":[78,143,175],"contents":[79],"even":[80],"though":[81],"are":[83,102,163],"randomized.We":[84],"believe":[85],"key":[88],"factor":[89],"correlations":[92,138,162],"among":[93],"attributes.":[94],"We":[95,126],"propose":[96,183],"two":[97],"reconstruction":[99,208],"methods":[100],"based":[103,149],"on":[104,133],"correlations.":[106],"One":[107],"method":[108,119],"uses":[109,120],"Principal":[111],"Component":[112],"Analysis":[113],"(PCA)":[114],"technique,":[115],"other":[118],"Bayes":[122],"Estimate":[123],"(BE)":[124],"technique.":[125],"conducted":[128],"theoretical":[129],"experimental":[131],"analysis":[132],"relationship":[135],"between":[136],"amount":[141],"information":[144,176],"can":[146,168,177],"disclosed":[148],"our":[150],"proposed":[151],"reconstructions":[153],"schemes.":[154],"Our":[155,202],"studies":[156],"shown":[158,205],"when":[160],"high,":[164],"original":[166,200],"reconstructed":[170],"more":[171,174],"accurately,":[172],"i.e.,":[173],"disclosed.To":[179],"improve":[180],"privacy,":[181],"we":[182,190],"modified":[185],"scheme,":[187],"which":[189],"let":[191],"correlation":[193],"random":[195],"noises":[196],"\"similar\"":[197],"data.":[201],"results":[203],"accuracy":[209],"both":[211],"PCA-based":[212],"BE-based":[214],"schemes":[215],"become":[216],"worse":[217],"similarity":[220],"increases.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":18},{"year":2019,"cited_by_count":20},{"year":2018,"cited_by_count":16},{"year":2017,"cited_by_count":26},{"year":2016,"cited_by_count":20},{"year":2015,"cited_by_count":29},{"year":2014,"cited_by_count":27},{"year":2013,"cited_by_count":29},{"year":2012,"cited_by_count":27}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
