{"id":"https://openalex.org/W1966351382","doi":"https://doi.org/10.1145/2492517.2500267","title":"GASNA","display_name":"GASNA","publication_year":2013,"publication_date":"2013-08-25","ids":{"openalex":"https://openalex.org/W1966351382","doi":"https://doi.org/10.1145/2492517.2500267","mag":"1966351382"},"language":"en","primary_location":{"id":"doi:10.1145/2492517.2500267","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2492517.2500267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066343710","display_name":"Mayank Singh Shishodia","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mayank Singh Shishodia","raw_affiliation_strings":["Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063454355","display_name":"Sumeet Jain","orcid":"https://orcid.org/0000-0002-7613-6284"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sumeet Jain","raw_affiliation_strings":["Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017610833","display_name":"B. K. Tripathy","orcid":"https://orcid.org/0000-0003-3455-4549"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. K. Tripathy","raw_affiliation_strings":["Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066343710"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":0.47152357,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76892805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1161","last_page":"1166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8227715492248535},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.766051173210144},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7173358798027039},{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-anonymity","score":0.6922950744628906},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5861319303512573},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5421920418739319},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4983525276184082},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.493328720331192},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48341095447540283},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43761226534843445},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37198662757873535},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.34668493270874023},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2604965567588806},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2097846269607544},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1448984146118164},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10409453511238098}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8227715492248535},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.766051173210144},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7173358798027039},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.6922950744628906},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5861319303512573},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5421920418739319},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4983525276184082},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.493328720331192},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48341095447540283},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43761226534843445},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37198662757873535},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.34668493270874023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2604965567588806},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2097846269607544},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1448984146118164},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10409453511238098},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2492517.2500267","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2492517.2500267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W142118394","https://openalex.org/W1482680420","https://openalex.org/W1980075162","https://openalex.org/W1998091733","https://openalex.org/W2015953751","https://openalex.org/W2091706375","https://openalex.org/W2096296626","https://openalex.org/W2107069393","https://openalex.org/W2134167315","https://openalex.org/W2134479759","https://openalex.org/W2144143615","https://openalex.org/W2159024459","https://openalex.org/W6632004233"],"related_works":["https://openalex.org/W2381086482","https://openalex.org/W2355715322","https://openalex.org/W223766737","https://openalex.org/W2353100240","https://openalex.org/W1625052858","https://openalex.org/W3105058304","https://openalex.org/W2010323877","https://openalex.org/W2057844631","https://openalex.org/W1987868057","https://openalex.org/W1969103306"],"abstract_inverted_index":{"The":[0,104,133],"proliferation":[1],"of":[2,37,124,144,149],"social":[3,67,92,150],"networks":[4,68],"in":[5,16,30,39,56,91,116,166],"digital":[6],"media":[7],"has":[8,27,43,154],"proved":[9],"to":[10,66,86,127],"be":[11,63],"fruitful,":[12],"but":[13,59],"this":[14,80,117],"rise":[15],"popularity":[17],"is":[18],"accompanied":[19],"by":[20],"user":[21],"privacy":[22,36,54],"concerns.":[23],"Social":[24],"network":[25,93,151],"data":[26,42,94,152],"been":[28,51],"published":[29,41],"various":[31],"ways":[32],"and":[33,89,153],"preserving":[34],"the":[35,40,70,161,167],"individuals":[38],"become":[44],"an":[45,84],"important":[46],"concern.":[47],"Several":[48],"algorithms":[49,61,163],"have":[50,73],"developed":[52],"for":[53,131,147],"preservation":[55],"relational":[57],"data,":[58],"these":[60],"cannot":[62],"applied":[64],"directly":[65],"as":[69],"nodes":[71],"here":[72],"structural":[74,97],"properties":[75],"along":[76,99],"with":[77,100],"labels.":[78],"In":[79],"paper,":[81],"we":[82],"propose":[83,121],"algorithm":[85,106,139],"achieve":[87],"k-anonymity":[88],"l-diversity":[90],"which":[95,112],"provides":[96],"anonymity":[98,126],"sensitive":[101],"attribute":[102],"protection.":[103],"proposed":[105,165],"uses":[107],"novel":[108],"edge":[109,145],"addition":[110],"techniques":[111],"are":[113],"also":[114,120],"presented":[115],"paper.":[118],"We":[119],"a":[122,155],"concept":[123],"partial":[125],"reduce":[128],"anonymization":[129,148],"cost":[130],"d>1.":[132],"empirical":[134],"study":[135],"shows":[136],"that":[137],"our":[138],"requires":[140],"significantly":[141],"less":[142],"number":[143],"additions":[146],"substantially":[156],"lower":[157],"running":[158],"time":[159],"than":[160],"other":[162],"previously":[164],"field.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
