{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:09:34Z","timestamp":1774368574162,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"30","license":[{"start":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T00:00:00Z","timestamp":1713484800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T00:00:00Z","timestamp":1713484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19149-0","type":"journal-article","created":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T07:01:51Z","timestamp":1713510111000},"page":"74739-74756","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Manhattan-based k-member clustering and enhanced rabbit optimization algorithm for k-anonymization in social network"],"prefix":"10.1007","volume":"83","author":[{"given":"K.","family":"Sivasankari","sequence":"first","affiliation":[]},{"given":"K. M. Uma","family":"Maheswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,19]]},"reference":[{"key":"19149_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2018.08.017","volume":"164","author":"SA Abdelhameed","year":"2019","unstructured":"Abdelhameed SA, Moussa SM, Khalifa ME (2019) Restricted sensitive attributes-based sequential anonymization (RSA-SA) approach for privacy-preserving data stream publishing. Knowl-Based Syst 164:1\u201320","journal-title":"Knowl-Based Syst"},{"key":"19149_CR2","first-page":"306","volume-title":"In 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)","author":"A Kaur","year":"2017","unstructured":"Kaur A (2017) A hybrid approach of privacy preserving data mining using suppression and perturbation techniques. In 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA). IEEE, pp 306\u2013311"},{"issue":"8","key":"19149_CR3","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/j.im.2015.07.010","volume":"52","author":"TL James","year":"2015","unstructured":"James TL, Warkentin M, Collignon SE (2015) A dual privacy decision model for online social networks. Inf Manag 52(8):893\u2013908","journal-title":"Inf Manag"},{"issue":"2","key":"19149_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1049\/iet-net.2017.0137","volume":"7","author":"VVH Pham","year":"2018","unstructured":"Pham VVH, Yu S, Sood K, Cui L (2018) Privacy issues in social networks and analysis: a comprehensive survey. IET Netw 7(2):74\u201384","journal-title":"IET Netw"},{"issue":"2.27","key":"19149_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.14419\/ijet.v7i2.27.11747","volume":"7","author":"A Sharma","year":"2018","unstructured":"Sharma A, Pathak S (2018) Enhancement of k-anonymity algorithm for privacy preservation in social media. Int J Eng Technol 7(2.27):40\u201345","journal-title":"Int J Eng Technol"},{"key":"19149_CR6","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.eswa.2019.01.059","volume":"125","author":"M Kiabod","year":"2019","unstructured":"Kiabod M, Dehkordi MN, Barekatain B (2019) TSRAM: A time-saving k-degree anonymization method in social network. Expert Syst Appl 125:378\u2013396","journal-title":"Expert Syst Appl"},{"key":"19149_CR7","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.eswa.2017.07.010","volume":"88","author":"S Kumar","year":"2017","unstructured":"Kumar S, Kumar P (2017) Upper approximation based privacy preserving in online social networks. Expert Syst Appl 88:276\u2013289","journal-title":"Expert Syst Appl"},{"issue":"01","key":"19149_CR8","first-page":"1794","volume":"9","author":"VB Vaghela","year":"2020","unstructured":"Vaghela VB (2020) K-anonymization approach for privacy preserving in data mining. Int J Sci Technol Res 9(01):1794\u20131799","journal-title":"Int J Sci Technol Res"},{"issue":"1","key":"19149_CR9","doi-asserted-by":"publisher","first-page":"e6487","DOI":"10.1002\/cpe.6487","volume":"34","author":"A Abbasi","year":"2022","unstructured":"Abbasi A, Mohammadi B (2022) A clustering-based anonymization approach for privacy-preserving in the healthcare cloud. Concurr Comput: Pract Experience 34(1):e6487","journal-title":"Concurr Comput: Pract Experience"},{"key":"19149_CR10","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/s10207-017-0392-y","volume":"17","author":"K Murakami","year":"2018","unstructured":"Murakami K, Uno T (2018) Optimization algorithm for k-anonymization of datasets with low information loss. Int J Inf Secur 17:631\u2013644","journal-title":"Int J Inf Secur"},{"key":"19149_CR11","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10462-016-9484-8","volume":"47","author":"J Casas-Roma","year":"2017","unstructured":"Casas-Roma J, Herrera-Joancomart\u00ed J, Torra V (2017) A survey of graph-modification techniques for privacy-preserving on networks. Artif Intell Rev 47:341\u2013366","journal-title":"Artif Intell Rev"},{"key":"19149_CR12","doi-asserted-by":"publisher","first-page":"101753","DOI":"10.1016\/j.cose.2020.101753","volume":"93","author":"Y Liang","year":"2020","unstructured":"Liang Y, Samavi R (2020) Optimization-based k-anonymity algorithms. Comput Secur 93:101753","journal-title":"Comput Secur"},{"key":"19149_CR13","doi-asserted-by":"publisher","first-page":"2251","DOI":"10.1007\/s00607-021-00922-0","volume":"103","author":"Y Yan","year":"2021","unstructured":"Yan Y, Herman EA, Mahmood A, Feng T, Xie P (2021) A weighted k-member clustering algorithm for k-anonymization. Computing 103:2251\u20132273","journal-title":"Computing"},{"issue":"02","key":"19149_CR14","first-page":"1348","volume":"9","author":"S Sharma","year":"2020","unstructured":"Sharma S, Ahuja S (2020) enhancing privacy preservation using hybrid approach of K-anonymity, artificial bee colony and neural network. Int J Sci Technol Res 9(02):1348\u20131357","journal-title":"Int J Sci Technol Res"},{"key":"19149_CR15","first-page":"1","volume-title":"In 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","author":"S Madan","year":"2018","unstructured":"Madan S, Goswami P (2018) A privacy preserving scheme for big data publishing in the cloud using k-anonymization and hybridized optimization algorithm. In 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET). IEEE, pp 1\u20137"},{"key":"19149_CR16","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s10115-016-0923-2","volume":"49","author":"K-P Lin","year":"2016","unstructured":"Lin K-P (2016) Privacy-preserving kernel k-means clustering outsourcing with random transformation. Knowl Inf Syst 49:885\u2013908","journal-title":"Knowl Inf Syst"},{"key":"19149_CR17","doi-asserted-by":"publisher","first-page":"112968","DOI":"10.1016\/j.eswa.2019.112968","volume":"141","author":"RK Langari","year":"2020","unstructured":"Langari RK, Sardar S, Mousavi SAA, Radfar R (2020) Combined fuzzy clustering and firefly algorithm for privacy preserving in social networks. Expert Syst Appl 141:112968","journal-title":"Expert Syst Appl"},{"issue":"3","key":"19149_CR18","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11761-021-00324-2","volume":"15","author":"Y-T Tsou","year":"2021","unstructured":"Tsou Y-T, NaserAlraja M, Chen L-S, Chang Y-H, Yung-Li Hu, Huang Y, Chia-Mu Yu, Tsai P-Y (2021) (k, \u03b5, \u03b4)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy. SOCA 15(3):175\u2013185","journal-title":"SOCA"},{"issue":"3","key":"19149_CR19","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.3390\/s23031554","volume":"23","author":"B Su","year":"2023","unstructured":"Su B, Huang J, Miao K, Wang Z, Zhang X, Chen Y (2023) K-anonymity privacy protection algorithm for multi-dimensional data against skewness and similarity attacks. Sensors 23(3):1554","journal-title":"Sensors"},{"issue":"7","key":"19149_CR20","first-page":"4075","volume":"34","author":"L Kacha","year":"2022","unstructured":"Kacha L, Zitouni A, Djoudi M (2022) KAB: a new k-anonymity approach based on black hole algorithm. J King Saud Univ-Comput Inform Sci 34(7):4075\u20134088","journal-title":"J King Saud Univ-Comput Inform Sci"},{"issue":"4","key":"19149_CR21","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.1007\/s13369-019-03999-0","volume":"45","author":"K Arava","year":"2020","unstructured":"Arava K, Lingamgunta S (2020) Adaptive k-anonymity approach for privacy preserving in cloud. Arab J Sci Eng 45(4):2425\u20132432","journal-title":"Arab J Sci Eng"},{"key":"19149_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-020-00655-6","volume":"10","author":"S Rajabzadeh","year":"2020","unstructured":"Rajabzadeh S, Shahsafi P, Khoramnejadi M (2020) A graph modification approach for k-anonymity in social networks using the genetic algorithm. Soc Netw Anal Min 10:1\u201317","journal-title":"Soc Netw Anal Min"},{"issue":"4","key":"19149_CR23","first-page":"430","volume":"15","author":"GC Ganabathi","year":"2019","unstructured":"Ganabathi GC, Maheswari PU (2019) Efficient clustering technique for k-anonymisation with aid of optimal KFCM. Int J Bus Intell Data Min 15(4):430\u2013448","journal-title":"Int J Bus Intell Data Min"},{"issue":"4","key":"19149_CR24","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TCSS.2019.2928324","volume":"6","author":"M Siddula","year":"2019","unstructured":"Siddula M, Li Y, Cheng X, Tian Z, Cai Z (2019) Anonymization in online social networks based on enhanced equi-cardinal clustering. IEEE Trans Comput Soc Syst 6(4):809\u2013820","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"19149_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2022.09.004","volume":"613","author":"L Caruccio","year":"2022","unstructured":"Caruccio L, Desiato D, Polese G, Tortora G, Zannone N (2022) A decision-support framework for data anonymization with application to machine learning processes. Inf Sci 613:1\u201332","journal-title":"Inf Sci"},{"issue":"01","key":"19149_CR26","first-page":"1794","volume":"9","author":"VB Vaghela","year":"2020","unstructured":"Vaghela VB (2020) K-anonymization approach for privacy preserving in data mining. Int J Sci Technol Res 9(01):1794\u20131799","journal-title":"Int J Sci Technol Res"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19149-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19149-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19149-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T02:27:07Z","timestamp":1725330427000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19149-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,19]]},"references-count":26,"journal-issue":{"issue":"30","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["19149"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19149-0","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,19]]},"assertion":[{"value":"11 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}