{"id":"https://openalex.org/W2955710479","doi":"https://doi.org/10.1145/3321707.3321778","title":"A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation","display_name":"A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation","publication_year":2019,"publication_date":"2019-07-03","ids":{"openalex":"https://openalex.org/W2955710479","doi":"https://doi.org/10.1145/3321707.3321778","mag":"2955710479"},"language":"en","primary_location":{"id":"doi:10.1145/3321707.3321778","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321707.3321778","pdf_url":null,"source":{"id":"https://openalex.org/S4363608932","display_name":"Proceedings of the Genetic and Evolutionary Computation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Genetic and Evolutionary Computation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011932689","display_name":"Yong-Feng Ge","orcid":"https://orcid.org/0000-0002-5955-6295"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Yong-Feng Ge","raw_affiliation_strings":["La Trobe University, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"La Trobe University, Victoria, Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071311514","display_name":"Jinli Cao","orcid":"https://orcid.org/0000-0002-0221-6361"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jinli Cao","raw_affiliation_strings":["La Trobe University, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"La Trobe University, Victoria, Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100403969","display_name":"Hua Wang","orcid":"https://orcid.org/0000-0002-8465-0996"},"institutions":[{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"education","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hua Wang","raw_affiliation_strings":["Victoria University, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"Victoria University, Victoria, Australia","institution_ids":["https://openalex.org/I71270174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080300563","display_name":"Jiao Yin","orcid":"https://orcid.org/0000-0002-0269-2624"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiao Yin","raw_affiliation_strings":["La Trobe University, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"La Trobe University, Victoria, Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100679900","display_name":"Wei\u2013Jie Yu","orcid":"https://orcid.org/0000-0002-8396-2023"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei-Jie Yu","raw_affiliation_strings":["Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011145004","display_name":"Zhi\u2010Hui Zhan","orcid":"https://orcid.org/0000-0003-0862-0514"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi-Hui Zhan","raw_affiliation_strings":["South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100400217","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0001-7835-9871"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5011932689"],"corresponding_institution_ids":["https://openalex.org/I196829312"],"apc_list":null,"apc_paid":null,"fwci":3.7751,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.94683422,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"771","last_page":"776"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7826845645904541},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.763801097869873},{"id":"https://openalex.org/keywords/fragmentation","display_name":"Fragmentation (computing)","score":0.6864447593688965},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5252679586410522},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5158593058586121},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4682406485080719},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4420429766178131},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4390959143638611},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.4290274977684021},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.42572927474975586},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4190353751182556},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18840652704238892},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.13622954487800598}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7826845645904541},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.763801097869873},{"id":"https://openalex.org/C191015642","wikidata":"https://www.wikidata.org/wiki/Q1132459","display_name":"Fragmentation (computing)","level":2,"score":0.6864447593688965},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5252679586410522},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5158593058586121},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4682406485080719},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4420429766178131},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4390959143638611},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.4290274977684021},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.42572927474975586},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4190353751182556},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18840652704238892},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.13622954487800598},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3321707.3321778","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321707.3321778","pdf_url":null,"source":{"id":"https://openalex.org/S4363608932","display_name":"Proceedings of the Genetic and Evolutionary Computation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Genetic and Evolutionary Computation Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.vu.edu.au:41670","is_oa":false,"landing_page_url":"https://vuir.vu.edu.au/41670/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400215","display_name":"Victoria University Research Repository (Victoria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I41156924","host_organization_name":"Victoria University of Wellington","host_organization_lineage":["https://openalex.org/I41156924"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1567206874","https://openalex.org/W1967738308","https://openalex.org/W1979088455","https://openalex.org/W2006716294","https://openalex.org/W2010110700","https://openalex.org/W2032415540","https://openalex.org/W2050035506","https://openalex.org/W2066676773","https://openalex.org/W2068617013","https://openalex.org/W2076004957","https://openalex.org/W2087649631","https://openalex.org/W2107710541","https://openalex.org/W2109554690","https://openalex.org/W2148452910","https://openalex.org/W2295445672","https://openalex.org/W2340339255","https://openalex.org/W2345464210","https://openalex.org/W2528685303","https://openalex.org/W2558150887","https://openalex.org/W2734985371","https://openalex.org/W2746680339","https://openalex.org/W2783225074","https://openalex.org/W4242210237"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W2083944649","https://openalex.org/W4309503015","https://openalex.org/W2596305496","https://openalex.org/W1548444773","https://openalex.org/W2577220285","https://openalex.org/W58529046"],"abstract_inverted_index":{"In":[0,42,56],"outsourcing":[1],"data":[2,13,27,40,45,52],"storage,":[3],"privacy":[4,18,71],"and":[5,72,95,103],"utility":[6,46,73],"are":[7,97],"significant":[8],"concerns.":[9],"Techniques":[10],"such":[11],"as":[12],"encryption":[14],"can":[15,38,47],"protect":[16,39],"the":[17,24,43,111],"of":[19,26,33,53],"sensitive":[20,34],"information":[21,81],"but":[22],"affect":[23],"efficiency":[25],"usage":[28],"accordingly.":[29],"By":[30],"splitting":[31],"attributes":[32],"associations,":[35],"database":[36,75,124],"fragmentation":[37,80],"privacy.":[41],"meantime,":[44],"be":[48],"improved":[49],"through":[50],"grouping":[51],"high":[54],"affinity.":[55],"this":[57],"paper,":[58],"a":[59,67,85],"benefit-driven":[60,91,113],"genetic":[61,114],"algorithm":[62,115],"is":[63,88,116],"proposed":[64,98,112],"to":[65,99],"achieve":[66],"better":[68],"balance":[69],"between":[70],"for":[74,93],"fragmentation.":[76,125],"To":[77],"integrate":[78],"useful":[79],"in":[82,123],"different":[83],"solutions,":[84],"matching":[86],"strategy":[87],"designed.":[89],"Two":[90],"operators":[92],"mutation":[94],"improvement":[96],"construct":[100],"valuable":[101],"fragments":[102],"rearrange":[104],"elements.":[105],"The":[106],"experimental":[107],"results":[108],"show":[109],"that":[110],"competitive":[117],"when":[118],"compared":[119],"with":[120],"existing":[121],"approaches":[122]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":8},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
