{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:07Z","timestamp":1766298307619,"version":"3.44.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20185-z","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T04:02:04Z","timestamp":1727323324000},"page":"28265-28285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive whale optimization based clustering method for K- anonymization in social networks"],"prefix":"10.1007","volume":"84","author":[{"given":"K.","family":"Sivasankari","sequence":"first","affiliation":[]},{"given":"K. M. Uma","family":"Maheswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,26]]},"reference":[{"key":"20185_CR1","doi-asserted-by":"crossref","unstructured":"Ouafae B, Mariam R, Oumaima L, Abdelouahid L (2020) Data anonymization in social networks state of the art, exposure of shortcomings and discussion of new innovations. In: 2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) pp 1\u201310","DOI":"10.1109\/IRASET48871.2020.9092064"},{"key":"20185_CR2","doi-asserted-by":"crossref","unstructured":"Chester S, Kapron BM, Srivastava G, Srinivasan V, Thomo A (2018) Anonymization and de-anonymization of social network data. In: Alhajj R, Rokne J (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY, pp 1\u201317","DOI":"10.1007\/978-1-4614-7163-9_22-1"},{"key":"20185_CR3","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.ins.2014.02.035","volume":"275","author":"F Bonchi","year":"2014","unstructured":"Bonchi F, Gionis A, Tassa T (2014) Identity obfuscation in graphs through the information theoretic lens. Inf Sci 275:232\u2013256","journal-title":"Inf Sci"},{"issue":"5","key":"20185_CR4","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1109\/TPDS.2016.2615020","volume":"28","author":"Q Liu","year":"2017","unstructured":"Liu Q, Wang G, Li F, Yang S, Wu J (2017) Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Trans Parallel Distrib Syst 28(5):1417\u20131429","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"20185_CR5","doi-asserted-by":"crossref","unstructured":"Skarkala ME, Maragoudakis M, Gritzalis S, Mitrou L, Toivonen H, Moen P (2012) \u201cPrivacy preservation by k-anonymization of weighted social networks,\u201d in Proc. Int. Conf. Adv. Social Netw. Anal. Mining (ASONAM), Aug. 2012, pp. 423\u2013428","DOI":"10.1109\/ASONAM.2012.75"},{"key":"20185_CR6","doi-asserted-by":"publisher","unstructured":"R. B. Ghate and R. Ingle, \"Clustering based Anonymization for privacy preservation,\"\u00a02015 International Conference on Pervasive Computing (ICPC), 2015, pp. 1-3.\u00a0https:\/\/doi.org\/10.1109\/PERVASIVE.2015.7087176","DOI":"10.1109\/PERVASIVE.2015.7087176"},{"issue":"4","key":"20185_CR7","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TCSS.2019.2928324","volume":"6","author":"M Siddula","year":"2019","unstructured":"Siddula M, Li Y, Cheng X, Tian Z, Cai Z (2019) Anonymization in Online Social Networks Based on Enhanced Equi-Cardinal Clustering. IEEE Trans Computational Soc Syst 6(4):809\u2013820. https:\/\/doi.org\/10.1109\/TCSS.2019.2928324","journal-title":"IEEE Trans Computational Soc Syst"},{"issue":"4","key":"20185_CR8","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TCSS.2019.2928324","volume":"6","author":"M Siddula","year":"2019","unstructured":"Siddula M, Li Y, Cheng X, Tian Z, Cai Z (2019) Anonymization in Online Social Networks Based on Enhanced Equi-Cardinal Clustering. IEEE Trans Computational Soc Syst 6(4):809\u2013820","journal-title":"IEEE Trans Computational Soc Syst"},{"key":"20185_CR9","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10207-018-0409-1","volume":"18","author":"M Ros-Martin","year":"2019","unstructured":"Ros-Martin M, Salas J, Casas-Roma J (2019) Scalable non-deterministic clustering-based k-anonymization for rich networks. Int J Inf Secur 18:219\u2013238","journal-title":"Int J Inf Secur"},{"key":"20185_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-020-00655-6","volume":"10","author":"S Rajabzadeh","year":"2020","unstructured":"Rajabzadeh S, Shahsafi P, Khoramnejadi M (2020) A graph modification approach for k-anonymity in social networks using the genetic algorithm. Soc Netw Anal Min 10:1\u201317","journal-title":"Soc Netw Anal Min"},{"key":"20185_CR11","doi-asserted-by":"publisher","first-page":"112968","DOI":"10.1016\/j.eswa.2019.112968","volume":"141","author":"RK Langari","year":"2020","unstructured":"Langari RK, Sardar S, Mousavi SAA, Radfar R (2020) Combined fuzzy clustering and firefly algorithm for privacy preserving in social networks. Expert Syst Appl 141:112968","journal-title":"Expert Syst Appl"},{"issue":"7","key":"20185_CR12","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1093\/comjnl\/bxz069","volume":"63","author":"N Yazdanjue","year":"2020","unstructured":"Yazdanjue N, Fathian M, Amiri B (2020) Evolutionary algorithms for k-anonymity in social networks based on clustering approach. Comput J 63(7):1039\u20131062","journal-title":"Comput J"},{"issue":"1","key":"20185_CR13","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1109\/TNET.2019.2962731","volume":"28","author":"L Fu","year":"2020","unstructured":"Fu L, Zhang J, Wang S, Wu X, Wang X, Chen G (2020) De-anonymizing social networks with overlapping community structure. IEEE\/ACM Trans Networking 28(1):360\u2013375","journal-title":"IEEE\/ACM Trans Networking"},{"key":"20185_CR14","doi-asserted-by":"crossref","unstructured":"Gao T. and Li F (2019) Privacy-preserving sketching for online social network data publication. In 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 1\u20139). IEEE","DOI":"10.1109\/SAHCN.2019.8824823"},{"issue":"8","key":"20185_CR15","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1587\/transinf.2015INP0019","volume":"99","author":"R Aghdam","year":"2016","unstructured":"Aghdam R, Sonehara N (2016) Achieving high data utility k-anonymization using similarity-based clustering model. IEICE Trans Information Systems 99(8):2069\u20132078","journal-title":"IEICE Trans. Information Systems"},{"key":"20185_CR16","doi-asserted-by":"crossref","unstructured":"Tsou, Yao-Tung, Mansour Naser Alraja, Li-Sheng Chen, Yu-Hsiang Chang, Yung-Li Hu, Yennun Huang, Chia-Mu Yu, and Pei-Yuan Tsai (2021) \"(k, \u03b5, \u03b4)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy.\" Service Oriented Computing and Applications 15, no. 3 175\u2013185","DOI":"10.1007\/s11761-021-00324-2"},{"issue":"3","key":"20185_CR17","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.3390\/s23031554","volume":"23","author":"B Su","year":"2023","unstructured":"Su B, Huang J, Miao K, Wang Z, Zhang X, Chen Y (2023) K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks. Sensors 23(3):1554","journal-title":"Sensors"},{"issue":"7","key":"20185_CR18","doi-asserted-by":"publisher","first-page":"4075","DOI":"10.1016\/j.jksuci.2021.04.014","volume":"34","author":"L Kacha","year":"2022","unstructured":"Kacha L, Zitouni A, Djoudi M (2022) KAB: a new k-anonymity approach based on black hole algorithm. J King Saud University-Comput Inf Sci 34(7):4075\u20134088","journal-title":"J King Saud University-Comput Inf Sci"},{"key":"20185_CR19","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"key":"20185_CR20","unstructured":"Yelp Dataset Challenge. Available from https:\/\/www.yelp.com\/dataset\/challenge. Accessed 6 Jul 2019"},{"key":"20185_CR21","unstructured":"Stanford Large Network Dataset Collection. Available from http:\/\/snap.stanford.edu\/data\/. Accessed 1 Jul 2019"},{"issue":"4","key":"20185_CR22","first-page":"430","volume":"15","author":"G. Chitra Ganabathi","year":"2019","unstructured":"Ganabathi G. Chitra, Uma Maheswari P (2019) Efficient clustering technique for k-anonymisation with aid of optimal KFCM. Int J Bus Intell Data Min 15(4):430\u2013448","journal-title":"Int J Bus Intell Data Min"},{"issue":"4","key":"20185_CR23","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TCSS.2019.2928324","volume":"6","author":"M Siddula","year":"2019","unstructured":"Siddula M, Li Y, Cheng X, Tian Z, Cai Z (2019) Anonymization in online social networks based on enhanced equi-cardinal clustering. IEEE Trans Computational Soc Syst 6(4):809\u2013820","journal-title":"IEEE Trans Computational Soc Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20185-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20185-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20185-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T00:13:18Z","timestamp":1757117598000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20185-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,26]]},"references-count":23,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["20185"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20185-z","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,9,26]]},"assertion":[{"value":"23 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}