{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:00:52Z","timestamp":1726034452698},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242886"},{"type":"electronic","value":"9783030242893"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24289-3_42","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T11:03:03Z","timestamp":1561719783000},"page":"566-578","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy vs. Utility: An Enhanced K-coRated"],"prefix":"10.1007","author":[{"given":"Ze","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Ghada","family":"El-Haddad","sequence":"additional","affiliation":[]},{"given":"Esma","family":"A\u00efmeur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Lohr, S.: Netflix cancels contest after concerns are raised about privacy, p. B3. New York Times (2010)","DOI":"10.1016\/S1361-3723(10)70017-8"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"El Haddad, G., A\u00efmeur, E., Hage, H.: Understanding trust, privacy and financial fears in online payment. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 28\u201336 (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00015"},{"key":"42_CR4","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.future.2018.03.043","volume":"85","author":"K Gai","year":"2018","unstructured":"Gai, K., Qiu, M., Xiong, Z., Liu, M.: Privacy-preserving multi-channel communication in edge-of-things. Future Gener. Comput. Syst. 85, 190\u2013200 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"42_CR5","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","volume":"34","author":"S Barth","year":"2017","unstructured":"Barth, S., de Jong, M.: The privacy paradox\u2013investigating discrepancies between expressed privacy concerns and actual online behavior\u2013a systematic literature review. Telemat. Inform. 34, 1038\u20131058 (2017)","journal-title":"Telemat. Inform."},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, F., Lee, V.E., Jin, R.: k-CoRating: filling up data to obtain privacy and utility. In: AAAI, pp. 320\u2013328 (2014)","DOI":"10.1609\/aaai.v28i1.8743"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Ye, Y., Wang, L., Han, J., Qiu, S., Luo, F.: An anonymization method combining anatomy and permutation for protecting privacy in microdata with multiple sensitive attributes. In: 2017 International Conference on Machine Learning and Cybernetics (ICMLC), pp. 404\u2013411 (2017)","DOI":"10.1109\/ICMLC.2017.8108955"},{"key":"42_CR8","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jpdc.2017.12.015","volume":"127","author":"F Zhang","year":"2018","unstructured":"Zhang, F., Lee, V.E., Jin, R., Garg, S., Choo, K.-K.R., Maasberg, M., et al.: Privacy-aware smart city: a case study in collaborative filtering recommender systems. J. Parallel Distrib. Comput. 127, 145\u2013159 (2018)","journal-title":"J. Parallel Distrib. Comput."},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Liu, H., Wu, Y., Lin, C., Lin, G.: Grey maximum distance to average vector based on quasi identifier attribute. In 2017 International Conference on Grey Systems and Intelligent Services (GSIS), p. 119 (2017)","DOI":"10.1109\/GSIS.2017.8077683"},{"key":"42_CR10","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-319-57339-7_11","volume-title":"Progress in Cryptology - AFRICACRYPT 2017","author":"Joppe W. Bos","year":"2017","unstructured":"Bos, J.W., Castryck, W., Iliashenko, I., Vercauteren, F.: Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling. In: International Conference on Cryptology in Africa, pp. 184\u2013201 (2017)"},{"key":"42_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00500-016-2442-1","volume":"22","author":"L Wu","year":"2018","unstructured":"Wu, L., Chen, B., Zeadally, S., He, D.: An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Comput. 22, 1\u201312 (2018)","journal-title":"Soft Comput."},{"key":"42_CR12","first-page":"1413","volume":"15","author":"JL Raisaro","year":"2018","unstructured":"Raisaro, J.L., Choi, G., Pradervand, S., Colsenet, R., Jacquemont, N., Rosat, N., et al.: Protecting privacy and security of genomic data in I2B2 with homomorphic encryption and differential privacy. IEEE\/ACM Trans. Comput. Biol. Bioinf. 15, 1413\u20131426 (2018)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinf."},{"key":"42_CR13","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-94890-4_9","volume-title":"Fog Computing","author":"C Cappiello","year":"2018","unstructured":"Cappiello, C., Plebani, P., Vitali, M.: A data utility model for data-intensive applications in fog computing environments. In: Mahmood, Z. (ed.) Fog Computing, pp. 183\u2013202. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94890-4_9"},{"key":"42_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-69471-9_5","volume-title":"Cyberspace Safety and Security","author":"Jianmin Han","year":"2017","unstructured":"Han, J., Yu, J., Lu, J., Peng, H., Wu, J.: An anonymization method to improve data utility for classification. In: International Symposium on Cyberspace Safety and Security, pp. 57\u201371 (2017)"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Brickell, J., Shmatikov, V.: The cost of privacy: destruction of data-mining utility in anonymized data publishing. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 70\u201378 (2008)","DOI":"10.1145\/1401890.1401904"},{"key":"42_CR16","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1109\/JSTSP.2018.2850021","volume":"12","author":"MP Johnson","year":"2018","unstructured":"Johnson, M.P., Zhao, L., Chakraborty, S.: Achieving Pareto-optimal MI-based privacy-utility tradeoffs under full data. IEEE J. Sel. Top. Signal Process. 12, 1093\u20131105 (2018)","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Li, T., Li, N.: On the tradeoff between privacy and utility in data publishing. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 517\u2013526 (2009)","DOI":"10.1145\/1557019.1557079"},{"key":"42_CR18","unstructured":"Rastogi, V., Suciu, D., Hong, S.: The boundary between privacy and utility in data publishing. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 531\u2013542 (2007)"},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Batmaz, Z., Kaleli, C.: Methods of privacy preserving in collaborative filtering. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 261\u2013266 (2017)","DOI":"10.1109\/UBMK.2017.8093386"},{"key":"42_CR20","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: \u2113-density: privacy beyond k-anonymity. In: Proceedings of the International Conference on Data Engineering (ICDE 2006), Atlanta, Georgia (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"42_CR22","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"42_CR23","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: International Conference on Theory and Applications of Models of Computation, pp. 1\u201319 (2008)","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"Chen, K.-C., Yu, C.-M., Tai, B.-C., Li, S.-C., Tsou, Y.-T., Huang, Y., et al.: Data-driven approach for evaluating risk of disclosure and utility in differentially private data release. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 1130\u20131137 (2017)","DOI":"10.1109\/AINA.2017.172"},{"issue":"4","key":"42_CR25","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/TSMC.1985.6313426","volume":"SMC-15","author":"James M. Keller","year":"1985","unstructured":"Keller, J.M., Gray, M.R., Givens, J.A.: A fuzzy k-nearest neighbor algorithm. IEEE Trans. Syst. Man Cybern. 580\u2013585 (1985)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24289-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T05:45:13Z","timestamp":1663825513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24289-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242886","9783030242893"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24289-3_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}