{"id":"https://openalex.org/W4411917590","doi":"https://doi.org/10.1186/s42400-024-00345-2","title":"Unitanony: a fine-grained and practical anonymization framework for better data utility","display_name":"Unitanony: a fine-grained and practical anonymization framework for better data utility","publication_year":2025,"publication_date":"2025-07-01","ids":{"openalex":"https://openalex.org/W4411917590","doi":"https://doi.org/10.1186/s42400-024-00345-2"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00345-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00345-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00345-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00345-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023366723","display_name":"Shuguang Yuan","orcid":"https://orcid.org/0000-0002-1312-8762"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuguang Yuan","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, No.19 Shucun Road, Haidian District, Beijing, 100084, China","Key Laboratory of Cyberspace Security Defense, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, No.19 Shucun Road, Haidian District, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101408278","display_name":"Jing Yu","orcid":"https://orcid.org/0000-0003-0441-3251"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Yu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, No.19 Shucun Road, Haidian District, Beijing, 100084, China","Key Laboratory of Cyberspace Security Defense, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, No.19 Shucun Road, Haidian District, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100803844","display_name":"Tengfei Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tengfei Yang","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100435616","display_name":"Chi Chen","orcid":"https://orcid.org/0000-0001-8008-7043"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Chen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, No.19 Shucun Road, Haidian District, Beijing, 100084, China","Key Laboratory of Cyberspace Security Defense, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, No.19 Shucun Road, Haidian District, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023366723"],"corresponding_institution_ids":["https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07528879,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6532949805259705},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.561324954032898},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.5222897529602051},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.36778414249420166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17459696531295776},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.054953187704086304}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6532949805259705},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.561324954032898},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.5222897529602051},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36778414249420166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17459696531295776},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.054953187704086304}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00345-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00345-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00345-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3fc0cb83794d4cba9e9335e6843c6642","is_oa":true,"landing_page_url":"https://doaj.org/article/3fc0cb83794d4cba9e9335e6843c6642","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-17 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00345-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00345-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00345-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4039563609","display_name":null,"funder_award_id":"XDB06","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G7699199402","display_name":null,"funder_award_id":"XDB0690303","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411917590.pdf","grobid_xml":"https://content.openalex.org/works/W4411917590.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1967831627","https://openalex.org/W1968868556","https://openalex.org/W1974251814","https://openalex.org/W1983958448","https://openalex.org/W2009331946","https://openalex.org/W2057594797","https://openalex.org/W2059900053","https://openalex.org/W2081416313","https://openalex.org/W2088969708","https://openalex.org/W2090325367","https://openalex.org/W2116241118","https://openalex.org/W2119067110","https://openalex.org/W2128128412","https://openalex.org/W2134167315","https://openalex.org/W2135581534","https://openalex.org/W2136114025","https://openalex.org/W2161030490","https://openalex.org/W2161229593","https://openalex.org/W2162105856","https://openalex.org/W2609539869","https://openalex.org/W2801103464","https://openalex.org/W2911978475","https://openalex.org/W2998450570","https://openalex.org/W3007878074","https://openalex.org/W3048087777","https://openalex.org/W3093551604","https://openalex.org/W3214816803"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W3186420513"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"order":[2],"to":[3,35,59,103,176,187],"share":[4],"data":[5,11,46,61,76,102,173,236],"without":[6],"revealing":[7],"private":[8],"information,":[9],"privacy-preserving":[10],"publishing":[12],"techniques":[13,58],"are":[14,33],"proposed.":[15],"K-anonymity":[16,205],"and":[17,23,32,81,116,132,165,182,206,214,233,238],"l":[18,207],"-diversity":[19,208],"secure":[20],"against":[21],"identity":[22],"attribute":[24],"disclosure.":[25],"Anonymization":[26],"algorithms":[27,227],"enforce":[28],"the":[29,41,78,149,189,217,225],"above":[30],"models":[31],"willing":[34],"reach":[36],"two":[37],"primary":[38],"goals:":[39],"achieving":[40],"privacy":[42],"objective":[43],"while":[44],"maximizing":[45],"utility.":[47],"Even":[48],"though":[49],"anonymization":[50,167],"has":[51],"been":[52],"studied":[53],"for":[54,91,128,137,159],"decades,":[55],"finding":[56],"efficient":[57],"improve":[60],"utility":[62,237],"is":[63,68,148],"an":[64,104,134,192],"open":[65],"question.":[66],"It":[67,123,147],"a":[69,113,118,125,172,184],"crucial":[70],"challenge":[71],"that":[72,221],"impacts":[73],"many":[74,157,200],"anonymized":[75],"on":[77,209],"web,":[79],"cloud,":[80],"IoT":[82],"environments.":[83],"However,":[84,141],"some":[85],"factors":[86],"incur":[87],"huge":[88],"information":[89],"loss":[90],"existing":[92,226],"works.":[93],"The":[94],"original":[95],"dataset":[96],"may":[97],"be":[98],"transformed":[99],"into":[100],"generalized":[101],"excessive":[105],"extent.":[106,140],"To":[107],"address":[108],"this":[109],"problem,":[110],"we":[111,170],"give":[112],"new":[114,161],"framework":[115],"propose":[117],"heuristic":[119],"algorithm":[120,190,197,223],"called":[121],"UnitAnony.":[122],"builds":[124],"full-coverage":[126],"hierarchy":[127],"more":[129,153],"generalization":[130,139,154],"candidates":[131],"proposes":[133],"interval-mapping":[135],"technique":[136],"fine-grained":[138],"these":[142],"improvements":[143],"raise":[144],"another":[145],"challenge.":[146],"vast":[150],"cost":[151],"because":[152],"will":[155],"derive":[156],"operations":[158],"forming":[160],"values,":[162],"grouping":[163],"records,":[164],"verifying":[166],"models.":[168,201],"Therefore,":[169],"designed":[171],"structure":[174],"unit":[175],"generalize":[177],"records":[178],"at":[179],"low":[180],"costs":[181],"implemented":[183],"skipping":[185],"strategy":[186],"execute":[188],"within":[191],"acceptable":[193],"time.":[194],"Besides,":[195],"our":[196,222],"can":[198],"support":[199],"By":[202],"evaluating":[203],"well-known":[204],"real-world":[210],"datasets,":[211,216],"i.e.,":[212],"Adult":[213],"Census":[215],"experimental":[218],"results":[219],"demonstrate":[220],"outperforms":[224],"(e.g.,":[228],"Mondrian,":[229],"Top-down,":[230],"Improved-Clustering,":[231],"Flash,":[232],"Incognito)":[234],"regarding":[235],"effectiveness.":[239]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
