{"id":"https://openalex.org/W1992485787","doi":"https://doi.org/10.1145/2396761.2396845","title":"Right-protected data publishing with hierarchical clustering preservation","display_name":"Right-protected data publishing with hierarchical clustering preservation","publication_year":2012,"publication_date":"2012-10-29","ids":{"openalex":"https://openalex.org/W1992485787","doi":"https://doi.org/10.1145/2396761.2396845","mag":"1992485787"},"language":"en","primary_location":{"id":"doi:10.1145/2396761.2396845","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2396761.2396845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st ACM international conference on Information and knowledge management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091785745","display_name":"Michail Vlachos","orcid":"https://orcid.org/0000-0003-1008-5290"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Michail Vlachos","raw_affiliation_strings":["IBM Research - Zurich, Rueschlikon, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research - Zurich, Rueschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067014251","display_name":"Aleksander Wieczorek","orcid":"https://orcid.org/0000-0003-1565-1781"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Aleksander Wieczorek","raw_affiliation_strings":["Poznan University, Poznan, Poland"],"affiliations":[{"raw_affiliation_string":"Poznan University, Poznan, Poland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101711824","display_name":"Johannes Schneider","orcid":"https://orcid.org/0000-0002-3225-5564"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Johannes Schneider","raw_affiliation_strings":["IBM Research - Zurich, Rueschlikon, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research - Zurich, Rueschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091785745"],"corresponding_institution_ids":["https://openalex.org/I4210126328"],"apc_list":null,"apc_paid":null,"fwci":0.2776,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55414101,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"654","last_page":"663"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.740004301071167},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.630003809928894},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5776870846748352},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.5543762445449829},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5167586207389832},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47413918375968933},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.46625837683677673},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.45751234889030457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4500463902950287},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4362809956073761},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4241219758987427},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.25168079137802124},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.13593631982803345},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13242778182029724}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.740004301071167},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.630003809928894},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5776870846748352},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.5543762445449829},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5167586207389832},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47413918375968933},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.46625837683677673},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.45751234889030457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4500463902950287},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4362809956073761},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4241219758987427},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.25168079137802124},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.13593631982803345},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13242778182029724},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2396761.2396845","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2396761.2396845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st ACM international conference on Information and knowledge management","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.371.6239","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.371.6239","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://alumni.cs.ucr.edu/~mvlachos/pubs/cikm2012_1.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W14750675","https://openalex.org/W21427492","https://openalex.org/W161953262","https://openalex.org/W1498736158","https://openalex.org/W1544579602","https://openalex.org/W1834015261","https://openalex.org/W1937965543","https://openalex.org/W1964366273","https://openalex.org/W1968862776","https://openalex.org/W2027117386","https://openalex.org/W2031674781","https://openalex.org/W2050921398","https://openalex.org/W2074739868","https://openalex.org/W2100913369","https://openalex.org/W2104227584","https://openalex.org/W2107946060","https://openalex.org/W2111272198","https://openalex.org/W2112340198","https://openalex.org/W2116467012","https://openalex.org/W2119244616","https://openalex.org/W2120636855","https://openalex.org/W2127761256","https://openalex.org/W2133531446","https://openalex.org/W2139336600","https://openalex.org/W2150749698","https://openalex.org/W2151688311","https://openalex.org/W2152117417","https://openalex.org/W2158591705","https://openalex.org/W2164341199","https://openalex.org/W2164384758","https://openalex.org/W2172041433","https://openalex.org/W2544660614","https://openalex.org/W4247928320","https://openalex.org/W6676636834"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1846726187","https://openalex.org/W2009856579","https://openalex.org/W1593964766","https://openalex.org/W2387614453"],"abstract_inverted_index":{"The":[0],"emergence":[1],"of":[2,30,63,78],"cloud-based":[3],"storage":[4],"services":[5],"is":[6],"opening":[7],"up":[8],"new":[9],"avenues":[10],"in":[11,22,28],"data":[12,15,31,92],"exchange":[13],"and":[14,58,86],"dissemination.":[16],"This":[17,49],"has":[18],"amplified":[19],"the":[20,42,46,61,76,83,98,105,109,126],"interest":[21],"right-protection":[23,34],"mechanisms":[24],"for":[25,120],"establishing":[26],"ownership":[27,93],"case":[29],"leakage.":[32],"Current":[33],"technologies,":[35],"however,":[36],"rarely":[37],"provide":[38],"strong":[39],"guarantees":[40],"on":[41,104],"dataset":[43],"utility":[44],"after":[45,87],"protection":[47,122],"process.":[48],"work":[50],"presents":[51],"techniques":[52],"that":[53,75],"explicitly":[54],"address":[55],"this":[56],"shortcoming":[57],"provably":[59],"preserve":[60],"outcome":[62,77],"certain":[64],"mining":[65],"operations.":[66],"In":[67,97],"particular,":[68],"we":[69,100],"take":[70],"special":[71],"care":[72],"to":[73,116],"guarantee":[74],"hierarchical":[79],"clustering":[80],"operations":[81],"remains":[82],"same":[84],"before":[85],"right":[88,121],"protection.":[89],"We":[90,111],"encode":[91],"using":[94],"watermarking":[95],"principles.":[96],"process,":[99],"derive":[101],"fundamental":[102],"bounds":[103],"distortion":[106],"incurred":[107],"by":[108],"watermarking.":[110],"leverage":[112],"our":[113],"theoretical":[114],"analysis":[115],"design":[117,128],"fast":[118],"algorithms":[119],"without":[123],"exhaustively":[124],"searching":[125],"vast":[127],"space.":[129]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
