{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T14:51:33Z","timestamp":1747320693431,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,11,26]],"date-time":"2018-11-26T00:00:00Z","timestamp":1543190400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s12652-018-1122-7","type":"journal-article","created":{"date-parts":[[2018,11,26]],"date-time":"2018-11-26T11:39:12Z","timestamp":1543232352000},"page":"23-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Hybrid microaggregation for privacy preserving data mining"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0179-6699","authenticated-orcid":false,"given":"Balkis","family":"Abidi","sequence":"first","affiliation":[]},{"given":"Sadok","family":"Ben Yahia","sequence":"additional","affiliation":[]},{"given":"Charith","family":"Perera","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,26]]},"reference":[{"key":"1122_CR1","doi-asserted-by":"crossref","unstructured":"Abidi B, Ben\u00a0Yahia S (2013) Multi-PFKCN: a fuzzy possibilistic clustering algorithm based on neural network. In: Proceedings of international conference on fuzzy systems (FUZZ-IEEE 2013), Hyderabad, India, 7\u201310 July, 2013, IEEE, pp 1\u20138","DOI":"10.1109\/FUZZ-IEEE.2013.6622419"},{"key":"1122_CR2","unstructured":"Abidi B, Ben\u00a0Yahia S, Bouzeghoub A (2012) A new algorithm for fuzzy clustering able to find the optimal number of clusters. In: Proceedings of 24th international conference on tools with artificial intelligence, ICTAI 2012, Athens, Greece, November 7\u20139, 2012, IEEE, pp 806\u2013813"},{"key":"1122_CR3","unstructured":"Aggarwal CC, Yu PS (2008) An introduction to privacy-preserving data mining. In: Privacy-preserving data mining\u2014models and algorithms, advances in database systems, vol\u00a034, Springer, pp 1\u20139"},{"issue":"2","key":"1122_CR4","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal R, Srikant R (2000) Privacy-preserving data mining. ACM SIGMOD Rec 29(2):439\u2013450","journal-title":"ACM SIGMOD Rec"},{"key":"1122_CR5","doi-asserted-by":"crossref","unstructured":"Bennardo A, Pagano M, Piccolo S (2015) Multiple bank lending, creditor rights, and information sharing. Rev Financ","DOI":"10.1093\/rof\/rfu001"},{"issue":"2\u20133","key":"1122_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0098-3004(84)90020-7","volume":"10","author":"JC Bezdek","year":"1984","unstructured":"Bezdek JC, Ehrlich R, Full W (1984) FCM: the fuzzy c-means clustering algorithm. Comput Geosci 10(2\u20133):191\u2013203","journal-title":"Comput Geosci"},{"key":"1122_CR7","unstructured":"Brand R, Domingo-Ferrer J, Mateo-Sanz JM (2002) Reference data sets to test and compare SDC methods for protection of numerical microdata. Tech. rep., Computational Aspects of Statistical Confidentiality"},{"issue":"11","key":"1122_CR8","doi-asserted-by":"publisher","first-page":"1866","DOI":"10.1016\/j.jss.2007.02.014","volume":"80","author":"C Chang","year":"2007","unstructured":"Chang C, Li Y, Huang W (2007) TFRP: an efficient microaggregation algorithm for statistical disclosure control. J Syst Softw 80(11):1866\u20131878","journal-title":"J Syst Softw"},{"key":"1122_CR9","doi-asserted-by":"crossref","unstructured":"Chen K, Liu L (2008) A survey of multiplicative perturbation for privacy-preserving data mining. In: Privacy-preserving data mining\u2014models and algorithms, advances in database systems, vol\u00a034, Springer, pp 157\u2013181","DOI":"10.1007\/978-0-387-70992-5_7"},{"issue":"3","key":"1122_CR10","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s00779-011-0490-1","volume":"17","author":"C Chittaranjan","year":"2013","unstructured":"Chittaranjan C, Blom J, Gatica-Perez D (2013) Mining large-scale smartphone data for personality studies. Person Ubiq Comput 17(3):433\u2013450","journal-title":"Person Ubiq Comput"},{"key":"1122_CR11","unstructured":"Chui M, Farrell D, Jackson K (2014) How government can promote open data. Tech. rep., McKinsey Global Institute"},{"key":"1122_CR12","doi-asserted-by":"crossref","unstructured":"Ciriani V, di\u00a0Vimercati SDC, Foresti S, Samarati P (2007) Microdata protection. In: Secure data management in decentralized systems, advances in information security, vol\u00a033, Springer, pp 291\u2013321","DOI":"10.1007\/978-0-387-27696-0_9"},{"key":"1122_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13174-016-0048-6","volume":"7","author":"E Curry","year":"2016","unstructured":"Curry E, Dustdar S, Sheng QZ, Sheth A (2016) Smart cities\u2014enabling services and applications. J Internet Serv Appl 7:1","journal-title":"J Internet Serv Appl"},{"key":"1122_CR14","unstructured":"Domigo-Ferrer J, Solanas A, Mart\u00ednez-Ballest\u00e9 A (2006) Privacy in statistical databases: k-anonymity through microaggregation. In: Proceedings oh the IEEE international conference on granular computing, GrC 2006, Atlanta, Georgia, USA, May 10\u201312, 2006, pp 774\u2013777"},{"key":"1122_CR15","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer J (2008) A survey of inference control methods for privacy-preserving data mining. In: Privacy-preserving data mining, vol\u00a034, Springer, pp 53\u201380","DOI":"10.1007\/978-0-387-70992-5_3"},{"issue":"15","key":"1122_CR16","doi-asserted-by":"publisher","first-page":"2834","DOI":"10.1016\/j.ins.2010.04.005","volume":"180","author":"J Domingo-Ferrer","year":"2010","unstructured":"Domingo-Ferrer J, Gonz\u00e1lez-Nicol\u00e1s \u00da (2010) Hybrid microdata using microaggregation. Inf Sci 180(15):2834\u20132844","journal-title":"Inf Sci"},{"issue":"1","key":"1122_CR17","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer J, Mateo-Sanz JM (2002) Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans Knowl Data Eng 14(1):189\u2013201","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"1122_CR18","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/S0377-0427(03)00643-5","volume":"164\u2013165","author":"J Domingo-Ferrer","year":"2004","unstructured":"Domingo-Ferrer J, Torra V (2004) Disclosure risk assessment in statistical data protection. J Comput Appl Math 164\u2013165(1):285\u2013293","journal-title":"J Comput Appl Math"},{"issue":"2","key":"1122_CR19","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10618-005-0007-5","volume":"11","author":"J Domingo-Ferrer","year":"2005","unstructured":"Domingo-Ferrer J, Torra V (2005) Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Min Knowl Discov 11(2):195\u2013212","journal-title":"Data Min Knowl Discov"},{"key":"1122_CR20","doi-asserted-by":"crossref","unstructured":"Du W, Zhan Z (2003) Using randomized response techniques for privacy-preserving data mining. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining, ACM, KDD \u201903, pp 505\u2013510","DOI":"10.1145\/956750.956810"},{"key":"1122_CR21","doi-asserted-by":"crossref","unstructured":"Evfimievski A, Srikant R, Agrawal R, Gehrke J (2002) Privacy preserving mining of association rules. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining, ACM, KDD \u201902, pp 217\u2013228","DOI":"10.1145\/775047.775080"},{"key":"1122_CR22","doi-asserted-by":"crossref","unstructured":"Garfinkel SL (2015) De-identification of personal information. Tech. rep., National Institute of Standards and Technologie","DOI":"10.6028\/NIST.IR.8053"},{"key":"1122_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239","volume-title":"Statistical disclosure control","author":"A Hundepool","year":"2012","unstructured":"Hundepool A, Domingo-Ferrer J, Franconi L, Giessing S, Nordholt ES, Spicer K, de Wolf P (2012) Statistical disclosure control. Wiley, Oxford"},{"key":"1122_CR24","doi-asserted-by":"crossref","unstructured":"Johnson M, Egelman S, Bellovin SM (2012) Facebook and privacy: It\u2019s complicated. In: Proceedings of the eighth symposium on usable privacy and security, ACM, SOUPS \u201912, pp 9:1\u20139:15","DOI":"10.1145\/2335356.2335369"},{"issue":"4","key":"1122_CR25","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10115-004-0173-6","volume":"7","author":"H Kargupta","year":"2005","unstructured":"Kargupta H, Datta S, Wang Q, Sivakumar K (2005) Random-data perturbation techniques and privacy-preserving data mining. Knowl Inf Syst 7(4):387\u2013414","journal-title":"Knowl Inf Syst"},{"issue":"2","key":"1122_CR26","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/91.227387","volume":"1","author":"R Krishnapuram","year":"1993","unstructured":"Krishnapuram R, Keller J (1993) A possibilistic approach to clustering. IEEE Trans Fuzzy Syst 1(2):98\u2013110","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"4","key":"1122_CR27","doi-asserted-by":"publisher","first-page":"3256","DOI":"10.1016\/j.eswa.2009.09.054","volume":"37","author":"J Lin","year":"2010","unstructured":"Lin J, Wen T, Hsieh J, Chang P (2010) Density-based microaggregation for statistical disclosure control. Expert Syst Appl 37(4):3256\u20133263","journal-title":"Expert Syst Appl"},{"key":"1122_CR28","first-page":"359","volume-title":"A survey of attack techniques on privacy-preserving data perturbation methods","author":"K Liu","year":"2008","unstructured":"Liu K, Giannella C, Kargupta H (2008) A survey of attack techniques on privacy-preserving data perturbation methods. Springer, US, pp 359\u2013381"},{"issue":"1","key":"1122_CR29","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1):3","journal-title":"ACM Trans Knowl Discov Data"},{"key":"1122_CR30","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez-Ballest\u00e9 A, Solanas A, Domingo-Ferrer J, Mateo-Sanz JM (2007) A genetic approach to multivariate microaggregation for database privacy. In: Proceedings of the 23rd international conference on data engineering workshops, ICDE 2007, 15\u201320 April 2007, Istanbul, Turkey, pp 180\u2013185","DOI":"10.1109\/ICDEW.2007.4400989"},{"key":"1122_CR31","first-page":"209","volume-title":"Privacy-preserving data mining techniques: survey and challenges","author":"S Matwin","year":"2013","unstructured":"Matwin S (2013) Privacy-preserving data mining techniques: survey and challenges. Springer, Berlin, pp 209\u2013221"},{"key":"1122_CR32","unstructured":"Mivule K (2013) Utilizing noise addition for data privacy, an overview. Computing Research Repository (CoRR)"},{"issue":"3","key":"1122_CR33","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s00354-007-0061-1","volume":"27","author":"J Nin","year":"2009","unstructured":"Nin J, Torra V (2009) Analysis of the univariate microaggregation disclosure risk. New Gener Comput 27(3):197\u2013214","journal-title":"New Gener Comput"},{"issue":"3","key":"1122_CR34","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.datak.2008.06.014","volume":"67","author":"J Nin","year":"2008","unstructured":"Nin J, Herranz J, Torra V (2008) On the disclosure risk of multivariate microaggregation. Data Knowl Eng 67(3):399\u2013412","journal-title":"Data Knowl Eng"},{"key":"1122_CR35","first-page":"2","volume":"3","author":"R Novotny","year":"2014","unstructured":"Novotny R, Kuchta R, Kadlec J (2014) Smart city concept, applications and services. J Telecommun Syst Manag 3:2","journal-title":"J Telecommun Syst Manag"},{"key":"1122_CR36","doi-asserted-by":"crossref","first-page":"345","DOI":"10.3233\/SJU-2001-18409","volume":"18","author":"A Oganian","year":"2001","unstructured":"Oganian A, Domingo-Ferrer J (2001) On the complexity of optimal microaggregation for statistical disclosure control. Stat J United Nations Econ Comission Eur 18:345\u2013354","journal-title":"Stat J United Nations Econ Comission Eur"},{"issue":"6","key":"1122_CR37","first-page":"1701","volume":"57","author":"P Ohm","year":"2010","unstructured":"Ohm P (2010) Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev 57(6):1701\u20131777","journal-title":"UCLA Law Rev"},{"key":"1122_CR38","unstructured":"Pagliuca D, Seri G (1999) Some results of individual ranking method on the system of enterprise accounts annual survey. Tech. rep., Esprit SDC Project"},{"issue":"4","key":"1122_CR39","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/TFUZZ.2004.840099","volume":"13","author":"NR Pal","year":"2005","unstructured":"Pal NR, Pal K, Keller JM, Bezdek JC (2005) A possibilistic fuzzy c-means clustering algorithm. IEEE Trans Fuzzy Syst 13(4):517\u2013530","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"1122_CR40","unstructured":"Peersman G (2014) Overview: data collection and analysis methods in impact evaluation. Methodological briefs\u2014impact evaluation no. 10, UNICEF Office of Research"},{"key":"1122_CR41","unstructured":"Rider AK, Chawla NV (2013) An ensemble topic model for sharing healthcare data and predicting disease risk. In: Proceedings of the international conference on bioinformatics, computational biology and biomedical informatics, ACM, BCB\u201913, pp 333\u2013340"},{"key":"1122_CR42","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-25237-2_8","volume-title":"Computational Intelligence for Privacy and Security","author":"Agusti Solanas","year":"2012","unstructured":"Solanas A, Gonz\u00e1lez-Nicol\u00e1s \u00da, Mart\u00ednez-Ballest\u00e9 A (2012) Mixing genetic algorithms and V-MDAV to protect microdata. In: Computational intelligence for privacy and security, pp 115\u2013133"},{"key":"1122_CR43","unstructured":"Solon O (2018) Facebook says cambridge analytica may have gained 37m more users\u2019 data"},{"issue":"5","key":"1122_CR44","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzz Knowl Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzz Knowl Based Syst"},{"issue":"2","key":"1122_CR45","first-page":"67","volume":"1","author":"M Templ","year":"2008","unstructured":"Templ M (2008) Statistical disclosure control for microdata using the r-package sdcmicro. Trans Data Privacy 1(2):67\u201385","journal-title":"Trans Data Privacy"},{"key":"1122_CR46","doi-asserted-by":"publisher","first-page":"4","DOI":"10.18637\/jss.v067.i04","volume":"67","author":"M Templ","year":"2015","unstructured":"Templ M, Kowarik A, Meindl B (2015) Statistical disclosure control for micro-data using the r package sdcmicro. J Stat Softw 67:4","journal-title":"J Stat Softw"},{"key":"1122_CR47","unstructured":"Teplitzky S (2014) Open data, [open] access: linking data sharing and article sharing in the earth sciences. J Lib Scholar Commun"},{"key":"1122_CR48","first-page":"33","volume":"2016","author":"L Zoonen","year":"2016","unstructured":"Zoonen L (2016) Privacy concerns in smart cities. Gov Inf Q 2016:33","journal-title":"Gov Inf Q"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-1122-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-1122-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-1122-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T01:01:46Z","timestamp":1605488506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-1122-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,26]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["1122"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-1122-7","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2018,11,26]]},"assertion":[{"value":"11 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}