{"id":"https://openalex.org/W2793825040","doi":"https://doi.org/10.3233/ida-163482","title":"A weighted collaboration network generalization method for privacy protection in C-DBLP","display_name":"A weighted collaboration network generalization method for privacy protection in C-DBLP","publication_year":2018,"publication_date":"2018-02-22","ids":{"openalex":"https://openalex.org/W2793825040","doi":"https://doi.org/10.3233/ida-163482","mag":"2793825040"},"language":"en","primary_location":{"id":"doi:10.3233/ida-163482","is_oa":false,"landing_page_url":"https://doi.org/10.3233/ida-163482","pdf_url":null,"source":{"id":"https://openalex.org/S2498839158","display_name":"Intelligent Data Analysis","issn_l":"1088-467X","issn":["1088-467X","1571-4128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Data Analysis","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053920875","display_name":"Tinghuai Ma","orcid":"https://orcid.org/0000-0003-2320-1692"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tinghuai Ma","raw_affiliation_strings":["CICAEET, Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"CICAEET, Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, Jiangsu, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025699597","display_name":"Hao Yu","orcid":"https://orcid.org/0000-0002-4692-3965"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Hao","raw_affiliation_strings":["School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210044, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210044, Jiangsu, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042149855","display_name":"Xiafei Suo","orcid":null},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiafei Suo","raw_affiliation_strings":["School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210044, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210044, Jiangsu, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012475436","display_name":"Yu Xue","orcid":"https://orcid.org/0000-0002-9069-7547"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Xue","raw_affiliation_strings":["School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210044, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210044, Jiangsu, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056771555","display_name":"Jie Cao","orcid":"https://orcid.org/0000-0003-3354-7988"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Cao","raw_affiliation_strings":["School of Economics & Management, Nanjing University of Information Science & Technology, Nanjing 210044, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Economics & Management, Nanjing University of Information Science & Technology, Nanjing 210044, Jiangsu, China","institution_ids":["https://openalex.org/I200845125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5053920875"],"corresponding_institution_ids":["https://openalex.org/I200845125"],"apc_list":null,"apc_paid":null,"fwci":0.3258,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65632626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"22","issue":"1","first_page":"3","last_page":"19"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7331416606903076},{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-anonymity","score":0.7170203924179077},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.678152322769165},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6708921790122986},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5948418378829956},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5102665424346924},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44384312629699707},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4419192671775818},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.43504905700683594},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4340440034866333},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.42725202441215515},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3490247130393982},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3082931637763977},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.17968425154685974},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17883065342903137},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16188743710517883}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7331416606903076},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.7170203924179077},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.678152322769165},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6708921790122986},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5948418378829956},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5102665424346924},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44384312629699707},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4419192671775818},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.43504905700683594},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4340440034866333},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.42725202441215515},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3490247130393982},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3082931637763977},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.17968425154685974},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17883065342903137},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16188743710517883},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/ida-163482","is_oa":false,"landing_page_url":"https://doi.org/10.3233/ida-163482","pdf_url":null,"source":{"id":"https://openalex.org/S2498839158","display_name":"Intelligent Data Analysis","issn_l":"1088-467X","issn":["1088-467X","1571-4128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Data Analysis","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W5087905","https://openalex.org/W207296907","https://openalex.org/W839407891","https://openalex.org/W1479970606","https://openalex.org/W1544573083","https://openalex.org/W1587629899","https://openalex.org/W1671906456","https://openalex.org/W1808476295","https://openalex.org/W1970874697","https://openalex.org/W2008413086","https://openalex.org/W2015953751","https://openalex.org/W2025572017","https://openalex.org/W2032186932","https://openalex.org/W2061879449","https://openalex.org/W2077245798","https://openalex.org/W2083761388","https://openalex.org/W2096296626","https://openalex.org/W2119047901","https://openalex.org/W2119553540","https://openalex.org/W2124849257","https://openalex.org/W2125315567","https://openalex.org/W2128248866","https://openalex.org/W2138682683","https://openalex.org/W2144143615","https://openalex.org/W2155085077","https://openalex.org/W2170018461","https://openalex.org/W2288560581","https://openalex.org/W2336484677","https://openalex.org/W2399346891","https://openalex.org/W2432978112","https://openalex.org/W2586451513","https://openalex.org/W2588626627","https://openalex.org/W2602420801","https://openalex.org/W3099386891","https://openalex.org/W3104726078","https://openalex.org/W4285719527","https://openalex.org/W6678741303"],"related_works":["https://openalex.org/W2381086482","https://openalex.org/W2355715322","https://openalex.org/W2108805307","https://openalex.org/W223766737","https://openalex.org/W2353100240","https://openalex.org/W1625052858","https://openalex.org/W2010323877","https://openalex.org/W2057844631","https://openalex.org/W1987868057","https://openalex.org/W1969103306"],"abstract_inverted_index":{"The":[0,93,105,133],"increasing":[1],"population":[2],"of":[3,29,35,55,65,83,130,150,192,208,216,238,265,280],"online":[4],"communication":[5],"and":[6,11,146,165,263],"telecommunication":[7],"has":[8],"interested":[9],"scholars":[10],"researchers":[12],"considering":[13],"their":[14],"social":[15,18,36,44,120,131,160,173,194],"networks.":[16],"These":[17],"networks":[19,161],"datasets":[20,276],"play":[21],"an":[22],"exceptionally":[23],"important":[24],"role":[25],"in":[26,60,110,250,277],"the":[27,67,89,97,100,103,122,143,158,171,190,193,205,217,222,236,245,278],"research":[28,279],"data":[30,38,49,68,76,196],"mining.":[31],"However,":[32],"large":[33,53],"amounts":[34],"network":[37,195],"are":[39,77,86],"pr":[40],"oduced":[41],"by":[42],"using":[43],"networking":[45],"applications.":[46],"And":[47,180],"these":[48,75],"inevitably":[50],"contain":[51],"a":[52,167,214],"amount":[54],"personal":[56],"privacy":[57,72,84,111,209],"information.":[58],"Therefore,":[59],"order":[61,202],"to":[62,141,148,188,203,220,234,283],"avoid":[63],"disclosure":[64],"privacy,":[66],"holders":[69],"need":[70],"adopt":[71],"protection":[73,85,112],"before":[74],"released.":[78],"Furthermore,":[79,270],"most":[80],"current":[81],"methods":[82],"based":[87,107,169],"on":[88,96,108,170],"simple":[90],"graph":[91],"only.":[92],"weight":[94,123,134,218,225],"values":[95],"edges":[98,266],"represent":[99],"tightness":[101,126],"between":[102,127],"nodes.":[104],"algorithm":[106],"weights":[109],"field":[113],"is":[114,199],"still":[115],"relatively":[116],"rare.":[117],"In":[118,152,201],"real":[119,231],"networks,":[121,174],"can":[124],"indicate":[125],"two":[128,274],"individuals":[129],"relations.":[132],"may":[135],"be":[136],"as":[137],"attackers\u00e2\u0080\u0099":[138],"background":[139],"knowledge":[140],"re-identify":[142],"target":[144],"individual":[145],"lead":[147],"loss":[149],"privacy.":[151],"this":[153,211],"paper,":[154],"we":[155,228,271],"consider":[156],"protecting":[157],"weighted":[159,172,281],"from":[162],"weight-based":[163],"attacks":[164],"propose":[166],"method":[168,182,187,240],"named":[175],"k-weighted":[176],"generalization":[177,186],"anonymity":[178,248],"(KWGA).":[179],"This":[181],"combines":[183],"k-anonymous":[184],"with":[185],"ensure":[189,204],"security":[191],"when":[197],"it":[198],"published.":[200],"higher":[206],"validity":[207,237],"protection,":[210],"paper":[212],"introduces":[213],"concept":[215],"difference":[219],"reduce":[221],"modification":[223],"for":[224],"graph.":[226],"Finally,":[227],"firstly":[229],"use":[230,273],"dataset":[232],"C-DBLP":[233],"verify":[235,284],"our":[239,285],"perform":[241],"much":[242],"better":[243],"than":[244],"Fast":[246],"k-degree":[247],"(FKDA)":[249],"average":[251,259],"clustering":[252,256],"coefficient":[253,257],"(ACC),":[254],"global":[255],"(GCC),":[258],"path":[260],"length":[261],"(APL)":[262],"rate":[264],"change":[267],"four":[268],"aspects.":[269],"also":[272],"common":[275],"graphs":[282],"algorithm.":[286]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
