{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:40:05Z","timestamp":1743043205135,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030491604"},{"type":"electronic","value":"9783030491611"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49161-1_8","type":"book-chapter","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T08:04:41Z","timestamp":1590739481000},"page":"85-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Two-Levels Data Anonymization Approach"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Zouinina","sequence":"first","affiliation":[]},{"given":"Youn\u00e8s","family":"Bennani","sequence":"additional","affiliation":[]},{"given":"Nicoleta","family":"Rogovschi","sequence":"additional","affiliation":[]},{"given":"Abdelouahid","family":"Lyhyaoui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,29]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Bennani, Y.: Adaptive weighting of pattern features during learning. In: IJCNN 1999. International Joint Conference on Neural Networks. Proceedings. vol. 5, pp. 3008\u20133013. IEEE Service Center, Piscataway, NJ (1999)","DOI":"10.1109\/IJCNN.1999.836014"},{"issue":"2","key":"8_CR2","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/TPAMI.1979.4766909","volume":"PAMI\u20131","author":"D Davies","year":"1979","unstructured":"Davies, D., Bouldin, D.: A cluster separation measure. IEEE Trans. Pattern Anal. Mach. Intell. PAMI\u20131(2), 224\u2013227 (1979)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"8_CR3","doi-asserted-by":"crossref","first-page":"3298","DOI":"10.1109\/TIFS.2019.2914832","volume":"14","author":"J Domingo-Ferrer","year":"2019","unstructured":"Domingo-Ferrer, J., Soria-Comas, J., Mulero-Vellido, R.: Steered microaggregation as a unified primitive to anonymize data sets and data streams. IEEE Trans. Inf. Forensics Secur. 14(12), 3298\u20133311 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR4","doi-asserted-by":"crossref","DOI":"10.1002\/9781118348239","volume-title":"Statistical Disclosure Control","author":"A Hundepool","year":"2012","unstructured":"Hundepool, A., et al.: Statistical Disclosure Control. John Wiley, Hoboken (2012)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Inan, A., Kantarcioglu, M., Bertino, E.: Using anonymized data for classification. In: IEEE 25th International Conference on Data Engineering, pp. 429\u2013440 (2009)","DOI":"10.1109\/ICDE.2009.19"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10115-005-0211-z","volume":"9","author":"J Zhang","year":"2006","unstructured":"Zhang, J., Kang, D., Silvescu, A., Honavar, V.: Learning accurate and concise Naive Bayes classifiers from attribute value taxonomies and data. Knowl. Inf. Syst. 9, 157\u2013179 (2006). https:\/\/doi.org\/10.1007\/s10115-005-0211-z","journal-title":"Knowl. Inf. Syst."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: KDD 2006, pp. 277\u2013286 (2006)","DOI":"10.1145\/1150402.1150435"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Khan, S., Iqbal, K., Faizullah, S., Fahad, M., Ali, J., Ahmed, W.: Clustering based privacy preserving of big data using fuzzification and anonymization operation. ArXiv abs\/2001.01491 (2019)","DOI":"10.14569\/IJACSA.2019.0101239"},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1016\/j.future.2017.09.009","volume":"93","author":"S Kim","year":"2019","unstructured":"Kim, S., Chung, Y.D.: An anonymization protocol for continuous and dynamic privacy-preserving data collection. Future Gener. Comput. Syst. 93, 1065\u20131073 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97610-0","volume-title":"Self-organizing Maps","author":"T Kohonen","year":"1995","unstructured":"Kohonen, T.: Self-organizing Maps. Springer, Berlin (1995)"},{"key":"8_CR11","unstructured":"Martin, B.: Instance-based learning: Nearest neighbour with generalisation. Master\u2019s Thesis, Computer Science Department, Hamilton, New Zealand, University of Waikato (1995)"},{"key":"8_CR12","doi-asserted-by":"crossref","DOI":"10.1201\/b13097","volume-title":"The Complete Book of Data Anonymization: From Planning to Implementation","author":"B Raghunathan","year":"2013","unstructured":"Raghunathan, B.: The Complete Book of Data Anonymization: From Planning to Implementation. CRC Press, Boca Raton (2013)"},{"key":"8_CR13","doi-asserted-by":"crossref","first-page":"28258","DOI":"10.1109\/ACCESS.2018.2834858","volume":"6","author":"A Rodr\u00edguez-Hoyos","year":"2018","unstructured":"Rodr\u00edguez-Hoyos, A., Estrada-Jim\u00e9nez, J., Rebollo-Monedero, D., Parra-Arnau, J., Forn\u00e9, J.: Does $$k$$-anonymous microaggregation affect machine-learned macrotrends? IEEE Access 6, 28258\u201328277 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"8_CR14","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1023\/A:1026543900054","volume":"40","author":"Y Rubner","year":"2000","unstructured":"Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover\u2019s distance as a metric for image retrieval. Int. J. Comput. Vision 40(2), 99\u2013121 (2000)","journal-title":"Int. J. Comput. Vision"},{"key":"8_CR15","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-981-15-0694-9_7","volume-title":"Advances in Data and Information Sciences","author":"A Sharma","year":"2020","unstructured":"Sharma, A., Singh, G., Rehman, S.: A review of big data challenges and preserving privacy in big data. In: Kolhe, M.L., Tiwari, S., Trivedi, M.C., Mishra, K.K. (eds.) Advances in Data and Information Sciences. LNNS, vol. 94, pp. 57\u201365. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0694-9_7"},{"issue":"5","key":"8_CR16","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"8_CR17","doi-asserted-by":"crossref","DOI":"10.1201\/9781315370910","volume-title":"Data Privacy: Principles and Practice","author":"N Venkataramanan","year":"2016","unstructured":"Venkataramanan, N., Shriram, A.: Data Privacy: Principles and Practice. Chapman & Hall\/CRC, Boca Raton (2016)"},{"key":"8_CR18","unstructured":"Zhang, J., Honavar, V.: Learning from attribute value taxonomies and partially specified instances, Washington, DC, USA, pp. 880\u2013887 (2003)"},{"key":"8_CR19","unstructured":"Zhao, H., Fu, Y.: Dual-regularized multi-view outlier detection. In: IJCAI (2015)"},{"issue":"3","key":"8_CR20","first-page":"25","volume":"16","author":"S Zouinina","year":"2019","unstructured":"Zouinina, S., Bennani, Y., Ben-Fares, M., Lyhyaoui, A., Rogovschi, N.: Preserving utility during attribute-oriented data anonymization process. Aust. J. Intell. Inf. Process. Syst. 16(3), 25\u201335 (2019)","journal-title":"Aust. J. Intell. Inf. Process. Syst."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Zouinina, S., Grozavu, N., Bennani, Y., Lyhyaoui, A., Rogovschi, N.: Efficient k-anonymization through constrained collaborative clustering. In: IEEE Symposium Series on Computational Intelligence, SSCI 2018 (2018)","DOI":"10.1109\/SSCI.2018.8628635"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1007\/978-3-030-01424-7_79","volume-title":"Artificial Neural Networks and Machine Learning \u2013 ICANN 2018","author":"S Zouinina","year":"2018","unstructured":"Zouinina, S., Grozavu, N., Bennani, Y., Lyhyaoui, A., Rogovschi, N.: A topological k-anonymity model based on collaborative multi-view clustering. In: K\u016frkov\u00e1, V., Manolopoulos, Y., Hammer, B., Iliadis, L., Maglogiannis, I. (eds.) ICANN 2018. LNCS, vol. 11141, pp. 817\u2013827. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01424-7_79"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49161-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T16:54:10Z","timestamp":1722963250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49161-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030491604","9783030491611"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49161-1_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Neos Marmaras","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.aiai2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easyacademia.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}