{"id":"https://openalex.org/W6963155501","doi":"https://doi.org/10.18420/inf2022_16","title":"Learning without Looking: Similarity Preserving Hashing and Its Potential for Machine Learning in Privacy Critical Domains","display_name":"Learning without Looking: Similarity Preserving Hashing and Its Potential for Machine Learning in Privacy Critical Domains","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6963155501","doi":"https://doi.org/10.18420/inf2022_16"},"language":"en","primary_location":{"id":"doi:10.18420/inf2022_16","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_16","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/inf2022_16","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Eleks, Marian","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Eleks, Marian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Rebstadt, Jonas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rebstadt, Jonas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Fukas, Philipp","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fukas, Philipp","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Thomas, Oliver","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas, Oliver","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32097008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.39489999413490295,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.39489999413490295,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.08160000294446945,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.037300001829862595,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5691999793052673},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5396000146865845},{"id":"https://openalex.org/keywords/instance-based-learning","display_name":"Instance-based learning","score":0.4848000109195709},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.46810001134872437},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.45840001106262207},{"id":"https://openalex.org/keywords/computational-learning-theory","display_name":"Computational learning theory","score":0.43689998984336853},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3950999975204468}],"concepts":[{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.8051000237464905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8029999732971191},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.733299970626831},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5691999793052673},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5396000146865845},{"id":"https://openalex.org/C24138899","wikidata":"https://www.wikidata.org/wiki/Q17141258","display_name":"Instance-based learning","level":3,"score":0.4848000109195709},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.46810001134872437},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.45840001106262207},{"id":"https://openalex.org/C50292564","wikidata":"https://www.wikidata.org/wiki/Q2462783","display_name":"Computational learning theory","level":3,"score":0.43689998984336853},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3950999975204468},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.3467000126838684},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3458999991416931},{"id":"https://openalex.org/C77967617","wikidata":"https://www.wikidata.org/wiki/Q4677561","display_name":"Active learning (machine learning)","level":2,"score":0.34150001406669617},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.3379000127315521},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.3082999885082245},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.30630001425743103},{"id":"https://openalex.org/C115903097","wikidata":"https://www.wikidata.org/wiki/Q7094097","display_name":"Online machine learning","level":3,"score":0.2883000075817108},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C28006648","wikidata":"https://www.wikidata.org/wiki/Q6934509","display_name":"Multi-task learning","level":3,"score":0.26589998602867126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/inf2022_16","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_16","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/inf2022_16","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_16","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Machine":[0,44,75,102,130],"Learning":[1,45,76,103,131],"is":[2,25],"frequently":[3],"ranked":[4],"as":[5,123,125],"one":[6],"of":[7,41,49,57,95,118,143],"the":[8,20,39,47,55,86,139],"most":[9],"promising":[10],"technologies":[11],"in":[12,60],"several":[13],"application":[14,48],"domains":[15],"but":[16],"falls":[17],"short":[18],"when":[19],"data":[21,58,79,134],"necessary":[22],"for":[23,99,129],"training":[24],"privacy-sensitive":[26],"and":[27,83,97,120],"can":[28],"thus":[29],"not":[30],"be":[31],"used.":[32],"We":[33],"address":[34],"this":[35,67],"problem":[36],"by":[37],"extending":[38],"field":[40],"Privacy":[42,100],"Aware":[43,101],"with":[46,106],"Similarity":[50,108],"Preserving":[51,109],"Hashing":[52],"algorithms":[53,71,104,111,122],"to":[54,73,112,138],"task":[56],"anonymization":[59,70],"a":[61,93],"Design":[62,87],"Science":[63,88],"Research":[64,89],"approach.":[65],"In":[66],"endeavor,":[68],"novel":[69,121],"made":[72],"enable":[74],"on":[77,132],"anonymized":[78],"are":[80,135],"designed,":[81],"implemented,":[82],"evaluated.":[84],"Throughout":[85],"process,":[90],"we":[91],"present":[92],"collection":[94],"issues":[96],"requirements":[98],"along":[105],"three":[107],"Hashing-based":[110],"fulfil":[113],"them.":[114],"A":[115],"metric-based":[116],"comparison":[117],"established":[119],"well":[124],"new":[126],"arising":[127],"opportunities":[128],"sensitive":[133],"also":[136],"added":[137],"current":[140],"knowledge":[141],"base":[142],"Information":[144],"Systems":[145],"research.":[146]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
