{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T06:13:41Z","timestamp":1769840021293,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:00:00Z","timestamp":1765497600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:00:00Z","timestamp":1765497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Umea University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    Microaggregation is a powerful technique for safeguarding data, enabling us to strike a balance between the risk of disclosing sensitive information and the loss of valuable information. It is a crucial tool for data sharing that provides\n                    <jats:italic>k<\/jats:italic>\n                    -anonymity. With the growing prevalence of multi-view data, there is an increasing interest in protecting such data using appropriate techniques. To the best of our knowledge, this paper introduces the first approach specifically designed for multi-view data protection. We present a novel approach to microaggregation by introducing multi-view fuzzy c-means, which allows us to consider linear constraints on the variables in each view that describe the data. Our method ensures that the resulting clusters adhere to these constraints, even when the data being masked fails to satisfy them. This approach not only enhances data privacy by maintaining\n                    <jats:italic>k<\/jats:italic>\n                    -anonymity in multi-view contexts but also preserves the structural integrity of the data across different views. Our contributions include the development of a multi-view clustering framework with built-in privacy safeguards and the introduction of linear constraints to ensure consistency across multiple views. This innovative approach provides a robust solution for the privacy-preserving analysis and sharing of multi-view data.\n                  <\/jats:p>","DOI":"10.1007\/s00500-025-10948-7","type":"journal-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T09:54:06Z","timestamp":1765533246000},"page":"107-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy clustering-based microaggregation for multi-view data with constraints"],"prefix":"10.1007","volume":"30","author":[{"given":"Fatemeh","family":"Sadjadi","sequence":"first","affiliation":[]},{"given":"Vicen\u00e7","family":"Torra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,12]]},"reference":[{"key":"10948_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s10898-014-0149-3","volume":"60","author":"D Aloise","year":"2014","unstructured":"Aloise D, Hansen P, Rocha C, Santi \u00c9 (2014) Column generation bounds for numerical microaggregation. J Global Optim 60:165\u2013182","journal-title":"J Global Optim"},{"key":"10948_CR2","doi-asserted-by":"crossref","unstructured":"Jiang, B., Chen, S., Wang, B., Luo, B. (2022) Mglnn: Semi-supervised learning via multiple graph cooperative learning neural networks. Neural Netw 153:204\u2013214","DOI":"10.1016\/j.neunet.2022.05.024"},{"issue":"2\u20133","key":"10948_CR3","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0098-3004(84)90020-7","volume":"10","author":"JC Bezdek","year":"1984","unstructured":"Bezdek JC, Ehrlich R, Full W (1984) Fcm: The fuzzy c-means clustering algorithm. Comput Geosci 10(2\u20133):191\u2013203","journal-title":"Comput Geosci"},{"key":"10948_CR4","unstructured":"Defays, D., Nanopoulos, P. (1993) Panels of enterprises and confidentiality: the small aggregates method. 195\u2013204"},{"key":"10948_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2022.105817","volume":"144","author":"J Castro","year":"2022","unstructured":"Castro J, Gentile C, Spagnolo-Arrizabalaga E (2022) An algorithm for the microaggregation problem using column generation. Computers & Operations Research 144:105817","journal-title":"Computers & Operations Research"},{"key":"10948_CR6","doi-asserted-by":"crossref","unstructured":"Torra, V. (2004) Microaggregation for categorical variables: a median based approach. Springer 162\u2013174","DOI":"10.1007\/978-3-540-25955-8_13"},{"key":"10948_CR7","doi-asserted-by":"crossref","unstructured":"Hansen, S.L., Mukherjee, S. (2023) A polynomial algorithm for optimal univariate microaggregation. IEEE Trans Knowl Data Eng 15:1043\u20131044","DOI":"10.1109\/TKDE.2003.1209020"},{"key":"10948_CR8","doi-asserted-by":"crossref","unstructured":"Oganian, A., Domingo-Ferrer, J. (2001) On the complexity of optimal microaggregation for statistical disclosure control. Stat J UN Econ Comm Eur 18(4):345\u2013353","DOI":"10.3233\/SJU-2001-18409"},{"key":"10948_CR9","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer J, Mateo-Sanz JM (2002) Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans Knowl Data Eng 14:189\u2013201","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10948_CR10","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10618-005-0007-5","volume":"11","author":"J Domingo-Ferrer","year":"2005","unstructured":"Domingo-Ferrer J, Torra V (2005) Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Min Knowl Disc 11:195\u2013212","journal-title":"Data Min Knowl Disc"},{"key":"10948_CR11","doi-asserted-by":"crossref","unstructured":"Mortazavi, R., Jalili, S. (2015) Preference-based anonymization of numerical datasets by multi-objective microaggregation. Inf Fusion 25:85\u2013104","DOI":"10.1016\/j.inffus.2014.10.003"},{"key":"10948_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.20965\/jaciii.2018.p0062","volume":"22","author":"Y Endo","year":"2018","unstructured":"Endo Y, Hamasuna Y, Hirano T, Kinoshita N (2018) Even-sized clustering based on optimization and its variants. J Adv Comput Intell Intell Inform 22:62\u201369","journal-title":"J Adv Comput Intell Intell Inform"},{"key":"10948_CR13","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1109\/TKDE.2003.1209020","volume":"15","author":"SL Hansen","year":"2003","unstructured":"Hansen SL, Mukherjee S (2003) A polynomial algorithm for optimal univariate microaggregation. IEEE Trans Knowl Data Eng 15:1043\u20131044","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10948_CR14","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/TCYB.2014.2334595","volume":"45","author":"Y Jiang","year":"2014","unstructured":"Jiang Y, Chung F-L, Wang S, Deng Z, Wang J, Qian P (2014) Collaborative fuzzy clustering from multiple weighted views. IEEE Trans Cybern 45:688\u2013701","journal-title":"IEEE Trans Cybern"},{"key":"10948_CR15","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.neunet.2022.05.024","volume":"153","author":"B Jiang","year":"2022","unstructured":"Jiang B, Chen S, Wang B, Luo B (2022) Mglnn: Semi-supervised learning via multiple graph cooperative learning neural networks. Neural Netw 153:204\u2013214","journal-title":"Neural Netw"},{"key":"10948_CR16","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1515\/jos-2015-0006","volume":"31","author":"HJ Kim","year":"2015","unstructured":"Kim HJ, Karr AF, Reiter JP (2015) Statistical disclosure limitation in the presence of edit rules. J Off Stat 31:121\u2013138","journal-title":"J Off Stat"},{"key":"10948_CR17","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1080\/01621459.2015.1040881","volume":"110","author":"HJ Kim","year":"2015","unstructured":"Kim HJ, Cox LH, Karr AF, Reiter JP, Wang Q (2015) Simultaneous edit-imputation for continuous microdata. J Am Stat Assoc 110:987\u2013999","journal-title":"J Am Stat Assoc"},{"key":"10948_CR18","doi-asserted-by":"publisher","first-page":"537","DOI":"10.20965\/jaciii.2018.p0537","volume":"22","author":"K Kitajima","year":"2018","unstructured":"Kitajima K, Endo Y, Hamasuna Y (2018) Fuzzified even-sized clustering based on optimization. J Adv Comput Intell Intell Inform 22:537\u2013543","journal-title":"J Adv Comput Intell Intell Inform"},{"key":"10948_CR19","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jss.2014.10.012","volume":"100","author":"M Laszlo","year":"2015","unstructured":"Laszlo M, Mukherjee S (2015) Iterated local search for microaggregation. J Syst Softw 100:15\u201326","journal-title":"J Syst Softw"},{"key":"10948_CR20","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.ins.2019.07.042","volume":"503","author":"DR Monedero","year":"2019","unstructured":"Monedero DR, Mezher AM, Colom\u00e9 XC, Forn\u00e9 J, Soriano M (2019) Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis. Inf Sci 503:417\u2013443","journal-title":"Inf Sci"},{"key":"10948_CR21","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.knosys.2014.05.011","volume":"67","author":"R Mortazavi","year":"2014","unstructured":"Mortazavi R, Jalili S (2014) Fast data-oriented microaggregation algorithm for large numerical datasets. Knowl-Based Syst 67:195\u2013205","journal-title":"Knowl-Based Syst"},{"key":"10948_CR22","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.inffus.2014.10.003","volume":"25","author":"R Mortazavi","year":"2015","unstructured":"Mortazavi R, Jalili S (2015) Preference-based anonymization of numerical datasets by multi-objective microaggregation. Inf Fusion 25:85\u2013104","journal-title":"Inf Fusion"},{"key":"10948_CR23","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1142\/S0218488508005285","volume":"16","author":"J Nin","year":"2008","unstructured":"Nin J, Herranz J, Torra V (2008) How to group attributes in multivariate microaggregation. Internat J Uncertain Fuzziness Knowl-Based Syst 16:121\u2013138","journal-title":"Internat J Uncertain Fuzziness Knowl-Based Syst"},{"key":"10948_CR24","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.datak.2008.06.014","volume":"67","author":"J Nin","year":"2008","unstructured":"Nin J, Herranz J, Torra V (2008) On the disclosure risk of multivariate microaggregation. Data Knowl Eng 67:399\u2013412","journal-title":"Data Knowl Eng"},{"issue":"4","key":"10948_CR25","first-page":"345","volume":"18","author":"A Oganian","year":"2001","unstructured":"Oganian A, Domingo-Ferrer J (2001) On the complexity of optimal microaggregation for statistical disclosure control. Stat J U N Econ Comm Eur 18(4):345\u2013353","journal-title":"Stat J U N Econ Comm Eur"},{"key":"10948_CR26","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s10044-011-0199-9","volume":"16","author":"BJ Oommen","year":"2013","unstructured":"Oommen BJ, Fayyoumi E (2013) On utilizing dependence-based information to enhance micro-aggregation for secure statistical databases. Pattern Anal Appl 16:99\u2013116","journal-title":"Pattern Anal Appl"},{"key":"10948_CR27","first-page":"86","volume":"2","author":"M Sadaaki","year":"1997","unstructured":"Sadaaki M, Masao M (1997) Fuzzy c-means as a regularization and maximum entropy approach 2:86\u201392","journal-title":"Fuzzy c-means as a regularization and maximum entropy approach"},{"key":"10948_CR28","doi-asserted-by":"crossref","unstructured":"Torra, V. (2017) Fuzzy microaggregation for the transparency principle. J Appl Log 23:70\u201380","DOI":"10.1016\/j.jal.2016.11.007"},{"key":"10948_CR29","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s10618-016-0457-y","volume":"31","author":"M Salari","year":"2017","unstructured":"Salari M, Jalili S, Mortazavi R (2017) Tbm, a transformation based method for microaggregation of large volume mixed data. Data Min Knowl Disc 31:65\u201391","journal-title":"Data Min Knowl Disc"},{"key":"10948_CR30","unstructured":"Shlomo, N., De\u00a0Waal, T. (2006) Protection of micro-data subject to edit constraints against statistical disclosure. J Off Stat 24(2):229-253"},{"key":"10948_CR31","first-page":"173","volume":"22","author":"N Shlomo","year":"2005","unstructured":"Shlomo N, De Waal T (2005) Preserving edits when perturbing microdata for statistical disclosure control. Stat J U N Econ Comm Eur 22:173\u2013185","journal-title":"Stat J U N Econ Comm Eur"},{"key":"10948_CR32","unstructured":"Torra, V. (2008) Constrained microaggregation. Trans Data Priv 1:86\u2013104"},{"key":"10948_CR33","doi-asserted-by":"crossref","unstructured":"Kim, H.J., Karr, A.F., Reiter, J.P. (2015) Statistical disclosure limitation in the presence of edit rules. J Off Stat 31:121\u2013138","DOI":"10.1515\/jos-2015-0006"},{"key":"10948_CR34","doi-asserted-by":"crossref","unstructured":"Kim, H.J., Cox, L.H., Karr, A.F., Reiter, J.P., Wang, Q. (2015) Simultaneous edit-imputation for continuous microdata. J Am Stat Assoc 110:987\u2013999","DOI":"10.1080\/01621459.2015.1040881"},{"key":"10948_CR35","first-page":"86","volume":"1","author":"V Torra","year":"2008","unstructured":"Torra V (2008) Constrained microaggregation Transactions on Data Privacy 1:86\u2013104","journal-title":"Constrained microaggregation Transactions on Data Privacy"},{"key":"10948_CR36","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.jal.2016.11.007","volume":"23","author":"V Torra","year":"2017","unstructured":"Torra V (2017) Fuzzy microaggregation for the transparency principle. J Appl Log 23:70\u201380","journal-title":"J Appl Log"},{"key":"10948_CR37","first-page":"5999","volume":"39","author":"V Torra","year":"2020","unstructured":"Torra V (2020) Fuzzy clustering-based microaggregation to achieve probabilistic k-anonymity for data with constraints. J Intell Fuzzy Syst 39:5999\u20136008","journal-title":"J Intell Fuzzy Syst"},{"key":"10948_CR38","doi-asserted-by":"crossref","unstructured":"Wang, Y., Chen, L. (2017) Multi-view fuzzy clustering with minimax optimization for effective clustering of data from multiple sources. Expert Syst Appl 72:457\u2013466","DOI":"10.1016\/j.eswa.2016.10.006"},{"key":"10948_CR39","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.eswa.2016.10.006","volume":"72","author":"Y Wang","year":"2017","unstructured":"Wang Y, Chen L (2017) Multi-view fuzzy clustering with minimax optimization for effective clustering of data from multiple sources. Expert Syst Appl 72:457\u2013466","journal-title":"Expert Syst Appl"},{"key":"10948_CR40","doi-asserted-by":"publisher","first-page":"61109","DOI":"10.1109\/ACCESS.2019.2904887","volume":"7","author":"S Wang","year":"2019","unstructured":"Wang S, Zhu E, Hu J, Li M, Zhao K, Hu N, Liu X (2019) Efficient multiple kernel k-means clustering with late fusion. IEEE Access 7:61109\u201361120","journal-title":"IEEE Access"},{"key":"10948_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109140","volume":"126","author":"H Wei","year":"2022","unstructured":"Wei H, Chen L, Chen CP, Duan J, Han R, Guo L (2022) Fuzzy clustering for multiview data by combining latent information. Appl Soft Comput 126:109140","journal-title":"Appl Soft Comput"},{"key":"10948_CR42","first-page":"2002","volume":"8","author":"W Winkler","year":"2002","unstructured":"Winkler W (2002) Single ranking micro-aggregation and re-identification. Statistical Research Division report RR 8:2002","journal-title":"Statistical Research Division report RR"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10948-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-10948-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10948-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T15:54:51Z","timestamp":1769788491000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-10948-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,12]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["10948"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-10948-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,12]]},"assertion":[{"value":"27 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"All authors agreed with the content of this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}