{"id":"https://openalex.org/W3094538632","doi":"https://doi.org/10.1145/3340531.3411931","title":"A Graph Matching Attack on Privacy-Preserving Record Linkage","display_name":"A Graph Matching Attack on Privacy-Preserving Record Linkage","publication_year":2020,"publication_date":"2020-10-19","ids":{"openalex":"https://openalex.org/W3094538632","doi":"https://doi.org/10.1145/3340531.3411931","mag":"3094538632"},"language":"en","primary_location":{"id":"doi:10.1145/3340531.3411931","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3340531.3411931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048285961","display_name":"Anushka Vidanage","orcid":"https://orcid.org/0000-0002-5386-5871"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Anushka Vidanage","raw_affiliation_strings":["The Australian National University, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"The Australian National University, Canberra, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022945960","display_name":"Peter Christen","orcid":"https://orcid.org/0000-0003-3435-2015"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Peter Christen","raw_affiliation_strings":["The Australian National University, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"The Australian National University, Canberra, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038468449","display_name":"Thilina Ranbaduge","orcid":"https://orcid.org/0000-0001-5405-3704"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Thilina Ranbaduge","raw_affiliation_strings":["The Australian National University, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"The Australian National University, Canberra, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022560140","display_name":"Rainer Schnell","orcid":"https://orcid.org/0000-0001-7843-4974"},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Rainer Schnell","raw_affiliation_strings":["University Duisburg-Essen, Duisburg, Germany"],"affiliations":[{"raw_affiliation_string":"University Duisburg-Essen, Duisburg, Germany","institution_ids":["https://openalex.org/I62318514"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048285961"],"corresponding_institution_ids":["https://openalex.org/I118347636"],"apc_list":null,"apc_paid":null,"fwci":3.5195,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.93104736,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1485","last_page":"1494"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9704999923706055,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8095569610595703},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.707021951675415},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5760878920555115},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.48361220955848694},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.48309993743896484},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47219857573509216},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.4702569246292114},{"id":"https://openalex.org/keywords/linkage","display_name":"Linkage (software)","score":0.4451858401298523},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4414827525615692},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.43722808361053467},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4345552623271942},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4157869815826416},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.23391887545585632},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1343734860420227},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11119332909584045},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1060878336429596},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10397133231163025},{"id":"https://openalex.org/keywords/gene","display_name":"Gene","score":0.10394337773323059}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8095569610595703},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.707021951675415},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5760878920555115},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.48361220955848694},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.48309993743896484},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47219857573509216},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.4702569246292114},{"id":"https://openalex.org/C31266012","wikidata":"https://www.wikidata.org/wiki/Q6554340","display_name":"Linkage (software)","level":3,"score":0.4451858401298523},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4414827525615692},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.43722808361053467},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4345552623271942},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4157869815826416},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.23391887545585632},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1343734860420227},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11119332909584045},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1060878336429596},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10397133231163025},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.10394337773323059},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3340531.3411931","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3340531.3411931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"},{"id":"pmh:oai:openresearch-repository.anu.edu.au:1885/294450","is_oa":false,"landing_page_url":"http://hdl.handle.net/1885/294450","pdf_url":null,"source":{"id":"https://openalex.org/S4306402539","display_name":"ANU Open Research (Australian National University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118347636","host_organization_name":"Australian National University","host_organization_lineage":["https://openalex.org/I118347636"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management","raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W45362603","https://openalex.org/W49600654","https://openalex.org/W1547612978","https://openalex.org/W1585665690","https://openalex.org/W1595409123","https://openalex.org/W1916258859","https://openalex.org/W2029128277","https://openalex.org/W2038276547","https://openalex.org/W2041936211","https://openalex.org/W2067883080","https://openalex.org/W2068115726","https://openalex.org/W2080291321","https://openalex.org/W2123845384","https://openalex.org/W2141965543","https://openalex.org/W2222512263","https://openalex.org/W2289831356","https://openalex.org/W2402933441","https://openalex.org/W2415367524","https://openalex.org/W2510261309","https://openalex.org/W2577090845","https://openalex.org/W2584260284","https://openalex.org/W2771826352","https://openalex.org/W2792495104","https://openalex.org/W2888657195","https://openalex.org/W2894983428","https://openalex.org/W2925177113","https://openalex.org/W2949646143","https://openalex.org/W3023004203","https://openalex.org/W3092768173","https://openalex.org/W3103296165","https://openalex.org/W3103523530","https://openalex.org/W4230063144","https://openalex.org/W6602990663","https://openalex.org/W6670523108"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2606354411","https://openalex.org/W3037492708"],"abstract_inverted_index":{"To":[0],"facilitate":[1],"advanced":[2],"analytics,":[3],"data":[4],"science":[5],"projects":[6],"increasingly":[7],"require":[8],"records":[9,50,64,95],"about":[10,58],"individuals":[11],"to":[12,27,43,125,128,174,183],"be":[13,28,126],"linked":[14],"across":[15],"databases.":[16,204],"Generally":[17],"no":[18,223],"unique":[19],"entity":[20],"identifiers":[21],"are":[22,41],"available":[23],"in":[24,82,102,110,155,189],"the":[25,59,83,144],"databases":[26],"linked,":[29],"and":[30,37,74,98,188],"therefore":[31],"quasi-identifiers":[32],"such":[33,117],"as":[34,67,118],"names,":[35],"addresses,":[36],"dates":[38],"of":[39,48],"birth":[40],"used":[42,109],"link":[44],"records.":[45,150],"The":[46],"process":[47],"linking":[49],"without":[51],"revealing":[52],"any":[53,184],"sensitive":[54,176,214],"or":[55],"confidential":[56],"information":[57],"entities":[60],"represented":[61],"by":[62],"these":[63,217],"is":[65,180],"known":[66],"privacy-preserving":[68],"record":[69],"linkage":[70,112],"(PPRL).":[71],"Various":[72],"encoding":[73,199],"encryption":[75],"based":[76],"PPRL":[77,89,115,140,186,198,227],"methods":[78,90,141,200],"have":[79,123,229],"been":[80,230],"developed":[81],"past":[84],"two":[85],"decades.":[86],"Most":[87],"existing":[88],"calculate":[91],"approximate":[92,145],"similarities":[93,146],"between":[94,148],"because":[96],"errors":[97],"variations":[99],"can":[100,211],"occur":[101],"quasi-identifying":[103],"attribute":[104],"values.":[105,177],"Even":[106],"though":[107],"being":[108],"real-world":[111],"applications,":[113],"certain":[114],"methods,":[116],"popular":[119],"Bloom":[120],"filter":[121],"encoding,":[122],"shown":[124],"vulnerable":[127],"cryptanalysis":[129],"attacks.":[130],"In":[131],"this":[132],"paper":[133],"we":[134,193],"present":[135],"a":[136,156,165,171],"novel":[137],"attack":[138,152,179,210,225],"on":[139,196,226],"that":[142,208],"exploits":[143],"calculated":[147],"encoded":[149,162],"Our":[151,178],"matches":[153],"nodes":[154],"similarity":[157,167],"graph":[158,168],"generated":[159,169],"from":[160,170,216],"an":[161,190],"database":[163,173],"with":[164,219],"corresponding":[166],"plain-text":[172],"re-identify":[175,213],"not":[181],"limited":[182],"specific":[185],"method,":[187],"experimental":[191],"evaluation":[192,206],"apply":[194],"it":[195],"three":[197,202],"using":[201],"different":[203],"This":[205],"shows":[207],"our":[209],"successfully":[212],"values":[215],"encodings":[218],"high":[220],"accuracy":[221],"where":[222],"previous":[224],"would":[228],"successful.":[231]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":4}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
