{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:34:49Z","timestamp":1768314889858,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T00:00:00Z","timestamp":1687392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T00:00:00Z","timestamp":1687392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10586-023-04063-1","type":"journal-article","created":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T11:02:09Z","timestamp":1687431729000},"page":"2117-2132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A privacy-enhanced human activity recognition using GAN &amp; entropy ranking of microaggregated data"],"prefix":"10.1007","volume":"27","author":[{"given":"Ahmed","family":"Aleroud","sequence":"first","affiliation":[]},{"given":"Majd","family":"Shariah","sequence":"additional","affiliation":[]},{"given":"Rami","family":"Malkawi","sequence":"additional","affiliation":[]},{"given":"Samer Y.","family":"Khamaiseh","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Al-Alaj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,22]]},"reference":[{"key":"4063_CR1","doi-asserted-by":"crossref","unstructured":"A. Subahi and G. Theodorakopoulos, \"Ensuring Compliance of Iot Devices with Their Privacy Policy Agreement,\" in 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), 2018, pp. 100\u2013107.","DOI":"10.1109\/FiCloud.2018.00022"},{"issue":"2","key":"4063_CR2","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s10586-020-03190-3","volume":"24","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Zhang, J., Zhan, J.: Privacy protection for fog computing and the internet of things data based on blockchain. Clust. Comput. 24(2), 1331\u20131345 (2021)","journal-title":"Clust. Comput."},{"key":"4063_CR3","doi-asserted-by":"crossref","unstructured":"J. Saleem, M. Hammoudeh, U. Raza, B. Adebisi, and R. Ande, \"Iot Standardisation: Challenges, Perspectives and Solution,\" in Proceedings of the 2nd international conference on future networks and distributed systems, 2018, pp. 1\u20139.","DOI":"10.1145\/3231053.3231103"},{"key":"4063_CR4","unstructured":"N. Vollmer. Recital 26 Eu Gdpr. (2018), Accessed on, Available: https:\/\/www.privacy-regulation.eu\/en\/recital-26-GDPR.htm"},{"key":"4063_CR5","unstructured":"Fitness Tracking App Strava Gives Away Location of Secret Us Army Bases, Available: https:\/\/www.theguardian.com\/world\/2018\/jan\/28\/fitness-tracking-app-gives-away-location-of-secret-us-army-bases. (2017). Accessed July 2021"},{"key":"4063_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.pmcj.2018.05.003","volume":"48","author":"MAP Chamikara","year":"2018","unstructured":"Chamikara, M.A.P., Bert\u00f3k, P., Liu, D., Camtepe, S., Khalil, I.: Efficient data perturbation for privacy preserving and accurate data stream mining. Pervasive Mob. Comput. 48, 1\u201319 (2018)","journal-title":"Pervasive Mob. Comput."},{"issue":"5","key":"4063_CR7","doi-asserted-by":"publisher","first-page":"1571","DOI":"10.1109\/JIOT.2017.2712672","volume":"4","author":"A Akbar","year":"2017","unstructured":"Akbar, A., Khan, A., Carrez, F., Moessner, K.: Predictive analytics for complex iot data streams. IEEE Internet Things J. 4(5), 1571\u20131582 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"4063_CR8","first-page":"375","volume":"6","author":"D Karimanzira","year":"2019","unstructured":"Karimanzira, D., Rauschenbach, T.: Enhancing aquaponics management with iot-based predictive analytics for efficient information utilization. Inf. Process. Agric. 6(3), 375\u2013385 (2019)","journal-title":"Inf. Process. Agric."},{"issue":"1","key":"4063_CR9","doi-asserted-by":"publisher","first-page":"1611","DOI":"10.1007\/s10586-017-1298-1","volume":"22","author":"AM Elmisery","year":"2019","unstructured":"Elmisery, A.M., Rho, S., Aborizka, M.: A new computing environment for collective privacy protection from constrained healthcare devices to Iot cloud services. Clust. Comput. 22(1), 1611\u20131638 (2019)","journal-title":"Clust. Comput."},{"key":"4063_CR10","unstructured":"A. Makhzani, J. Shlens, N. Jaitly, I. Goodfellow, and B. Frey, \"Adversarial Autoencoders,\" arXiv preprint arXiv:1511.05644, no. 2015."},{"key":"4063_CR11","doi-asserted-by":"crossref","unstructured":"H. Chen, S. Jajodia, J. Liu, N. Park, V. Sokolov, and V. Subrahmanian, \"Faketables: Using Gans to Generate Functional Dependency Preserving Tables with Bounded Real Data,\" in IJCAI, 2019, pp. 2074\u20132080.","DOI":"10.24963\/ijcai.2019\/287"},{"key":"4063_CR12","doi-asserted-by":"crossref","unstructured":"N. Park, M. Mohammadi, K. Gorde, S. Jajodia, H. Park, and Y. Kim, \"Data Synthesis Based on Generative Adversarial Networks,\" arXiv preprint arXiv:1806.03384, no. 2018.","DOI":"10.14778\/3231751.3231757"},{"key":"4063_CR13","unstructured":"L. Xie, K. Lin, S. Wang, F. Wang, and J. Zhou, \"Differentially Private Generative Adversarial Network,\" arXiv preprint arXiv:1802.06739, no. 2018."},{"issue":"1","key":"4063_CR14","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10115-010-0311-2","volume":"28","author":"B Zhou","year":"2011","unstructured":"Zhou, B., Pei, J.: The K-anonymity and L-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst. 28(1), 47\u201377 (2011)","journal-title":"Knowl. Inf. Syst."},{"issue":"7","key":"4063_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/3433638","volume":"64","author":"J Domingo-Ferrer","year":"2021","unstructured":"Domingo-Ferrer, J., S\u00e1nchez, D., Blanco-Justicia, A.: The limits of differential privacy (and its misuse in data release and machine learning). Commun. ACM 64(7), 33\u201335 (2021)","journal-title":"Commun. ACM"},{"issue":"1","key":"4063_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1331904.1331906","volume":"33","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Yu, P.S.: On static and dynamic methods for condensation-based privacy-preserving data mining. ACM Trans. Database Syst. (TODS) 33(1), 1\u201339 (2008)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"issue":"9","key":"4063_CR17","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/TIFS.2019.2897874","volume":"14","author":"C Xu","year":"2019","unstructured":"Xu, C., Ren, J., Zhang, D., Zhang, Y., Qin, Z., Ren, K.: Ganobfuscator: mitigating information leakage under Gan via differential privacy. IEEE Trans. Inf. Forensics Secur. 14(9), 2358\u20132371 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"4063_CR18","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., et al.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"issue":"05","key":"4063_CR19","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-Anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl-Based Syst."},{"issue":"1","key":"4063_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1331904.1331906","volume":"33","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Yu, P.S.: On static and dynamic methods for condensation-based privacy-preserving data mining. ACM Trans. Database Syst. (TODS) 33(1), 2 (2008)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"4063_CR21","doi-asserted-by":"crossref","unstructured":"C. C. Aggarwal and S. Y. Philip, \"A Condensation Approach to Privacy Preserving Data Mining,\" in International Conference on Extending Database Technology, 2004, pp. 183\u2013199.","DOI":"10.1007\/978-3-540-24741-8_12"},{"issue":"15","key":"4063_CR22","doi-asserted-by":"publisher","first-page":"2834","DOI":"10.1016\/j.ins.2010.04.005","volume":"180","author":"J Domingo-Ferrer","year":"2010","unstructured":"Domingo-Ferrer, J., Gonz\u00e1lez-Nicol\u00e1s, \u00da.: Hybrid microdata using microaggregation. Inf. Sci. 180(15), 2834\u20132844 (2010)","journal-title":"Inf. Sci."},{"key":"4063_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2200097","author":"MA Alsheikh","year":"2022","unstructured":"Alsheikh, M.A.: Five common misconceptions about privacy-preserving internet of things. IEEE Commun. Mag (2022). https:\/\/doi.org\/10.1109\/MCOM.001.2200097","journal-title":"IEEE Commun. Mag"},{"key":"4063_CR24","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.cose.2013.05.007","volume":"37","author":"A Alcaide","year":"2013","unstructured":"Alcaide, A., Palomar, E., Montero-Castillo, J., Ribagorda, A.: Anonymous authentication for privacy-preserving Iot target-driven applications. Comput. Secur. 37, 111\u2013123 (2013)","journal-title":"Comput. Secur."},{"key":"4063_CR25","doi-asserted-by":"crossref","unstructured":"A. Campan, T. M. Truta, and N. Cooper, \"User-Controlled Generalization Boundaries for P-Sensitive K-Anonymity,\" in Proceedings of the 2010 ACM Symposium on Applied Computing, 2010, pp. 1103\u20131104.","DOI":"10.1145\/1774088.1774317"},{"key":"4063_CR26","unstructured":"B. C. Fung, K. Wang, A. W.-C. Fu, and S. Y. Philip, Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques: Chapman and Hall\/CRC, 2010."},{"key":"4063_CR27","doi-asserted-by":"publisher","first-page":"2856","DOI":"10.1109\/INFCOM.2009.5062246","volume":"2009","author":"M Srivatsa","year":"2009","unstructured":"Srivatsa, M., Iyengar, A., Liu, L.: Privacy in voip networks: A K-anonymity approach. IEEE INFOCOM 2009, 2856\u20132860 (2009)","journal-title":"IEEE INFOCOM"},{"key":"4063_CR28","doi-asserted-by":"crossref","unstructured":"Haakensen and P. Thulasiraman, \"Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol,\" in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017, pp. 115-121","DOI":"10.1109\/UEMCON.2017.8249005"},{"key":"4063_CR29","doi-asserted-by":"crossref","unstructured":"X. Deng and J. Mirkovic, \"Commoner Privacy and a Study on Network Traces,\" in Proceedings of the 33rd Annual Computer Security Applications Conference, 2017, pp. 566\u2013576.","DOI":"10.1145\/3134600.3134602"},{"key":"4063_CR30","doi-asserted-by":"crossref","unstructured":"I. Margasi\u0144ski, \"A Parallelism-Based Approach to Network Anonymization,\" in Nordic Conference on Secure IT Systems, 2009, pp. 28\u201343.","DOI":"10.1007\/978-3-642-04766-4_3"},{"issue":"11","key":"4063_CR31","doi-asserted-by":"publisher","first-page":"3098","DOI":"10.1109\/TKDE.2015.2435777","volume":"27","author":"J Soria-Comas","year":"2015","unstructured":"Soria-Comas, J., Domingo-Ferrer, J., S\u00e1nchez, D., Martinez, S.: T-Closeness through microaggregation: strict privacy with enhanced utility preservation. IEEE Trans. Knowl. Data Eng. 27(11), 3098\u20133110 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"4063_CR32","doi-asserted-by":"crossref","unstructured":"B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, \"Achieving K-Anonymity in Privacy-Aware Location-Based Services,\" in IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2014, pp. 754\u2013762.","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"4063_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3126831","author":"L Zhang","year":"2021","unstructured":"Zhang, L., Cui, W., Li, B., Chen, Z., Wu, M., Gee, T.S.: Privacy-preserving cross-environment human activity recognition. IEEE Trans. Cybern. (2021). https:\/\/doi.org\/10.1109\/TCYB.2021.3126831","journal-title":"IEEE Trans. Cybern."},{"key":"4063_CR34","doi-asserted-by":"crossref","unstructured":"Y. Qu, S. Yu, J. Zhang, H. T. T. Binh, L. Gao, and W. Zhou, \"Gan-Dp: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing,\" in ICC 2019\u20132019 IEEE International Conference on Communications (ICC), 2019, pp. 1\u20136.","DOI":"10.1109\/ICC.2019.8761070"},{"issue":"1","key":"4063_CR35","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s10586-020-03137-8","volume":"24","author":"O Alfandi","year":"2021","unstructured":"Alfandi, O., Khanji, S., Ahmad, L., Khattak, A.: A Survey on boosting iot security and privacy through blockchain. Clust. Comput. 24(1), 37\u201355 (2021)","journal-title":"Clust. Comput."},{"key":"4063_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3147925","author":"T Li","year":"2022","unstructured":"Li, T., Wang, H., He, D., Yu, J.: Blockchain-based privacy-preserving and rewarding private data sharing for Iot. IEEE Internet Things J. (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3147925","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"4063_CR37","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jbi.2014.01.001","volume":"50","author":"TS Gal","year":"2014","unstructured":"Gal, T.S., Tucker, T.C., Gangopadhyay, A., Chen, Z.: A data recipient centered de-identification method to retain statistical attributes. J. Biomed. Inform. 50(1), 32\u201345 (2014)","journal-title":"J. Biomed. Inform."},{"issue":"1","key":"4063_CR38","first-page":"379","volume":"27","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E., Weaver, W., Blahut, R.E., Hajek, B.: The mathematical theory of communication. Bell Syst. Technical. J. 27(1), 379\u2013423 (1949)","journal-title":"Bell Syst. Technical. J."},{"issue":"6","key":"4063_CR39","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1007\/s11432-010-3117-7","volume":"53","author":"Q Hu","year":"2010","unstructured":"Hu, Q., Guo, M., Yu, D., Liu, J.: Information entropy for ordinal classification. Sci. China Inf. Sci. 53(6), 1188\u20131200 (2010)","journal-title":"Sci. China Inf. Sci."},{"key":"4063_CR40","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1016\/j.neucom.2015.07.085","volume":"171","author":"J-L Reyes-Ortiz","year":"2016","unstructured":"Reyes-Ortiz, J.-L., Oneto, L., Sam\u00e0, A., Parra, X., Anguita, D.: Transition-aware human activity recognition using smartphones. Neurocomputing 171, 754\u2013767 (2016)","journal-title":"Neurocomputing"},{"key":"4063_CR41","doi-asserted-by":"crossref","unstructured":"D. Agrawal and C. C. Aggarwal, \"On the Design and Quantification of Privacy Preserving Data Mining Algorithms,\" in Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, 2001, pp. 247\u2013255.","DOI":"10.1145\/375551.375602"},{"key":"4063_CR42","doi-asserted-by":"crossref","unstructured":"T. Farah and L. Trajkovi\u0107, \"Anonym: A Tool for Anonymization of the Internet Traffic,\" in 2013 IEEE International Conference on Cybernetics (CYBCO), 2013, pp. 261-266","DOI":"10.1109\/CYBConf.2013.6617434"},{"issue":"8","key":"4063_CR43","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TSE.2013.6","volume":"39","author":"F Peters","year":"2013","unstructured":"Peters, F., Menzies, T., Gong, L., Zhang, H.: Balancing privacy and utility in cross-company defect prediction. IEEE Trans. Softw. Eng. 39(8), 1054\u20131068 (2013)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04063-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04063-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04063-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:44:51Z","timestamp":1729626291000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04063-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,22]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["4063"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04063-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,22]]},"assertion":[{"value":"9 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}