{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:29Z","timestamp":1750309589011,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723188","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"71-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Priv-Fuzzy: a Cutting-Edge Privacy-Preserving Data Publishing Model Based on Fuzzy Logic"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1710-4689","authenticated-orcid":false,"given":"Tonny Shekha","family":"Kar","sequence":"first","affiliation":[{"name":"Computer Science, American International University Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0537-2805","authenticated-orcid":false,"given":"Anmoy","family":"Kar","sequence":"additional","affiliation":[{"name":"Computer Science, Daffodil International University, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Herv\u00e9 Abdi and Lynne\u00a0J. Williams. 2010. Principal component analysis. Wiley Interdisciplinary Reviews: Computational Statistics 2 4 (2010) 433\u2013459. 10.1002\/wics.101","DOI":"10.1002\/wics.101"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"L.\u00a0Huang B.\u00a0I.\u00a0P.\u00a0Rubinstein P.\u00a0L.\u00a0Bartlett and N. Taft. 2012. Learning in a large function space: Privacy-preserving mechanisms for SVM learning. Journal of Privacy and Confidentiality 4 1 (2012) 65\u2013100.","DOI":"10.29012\/jpc.v4i1.612"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"H.\u00a0Kaplan D.\u00a0Feldman A.\u00a0Fiat and K. Nissim. 2009. Private coresets. STOC (2009) 361\u2013\u2013370.","DOI":"10.1145\/1536414.1536465"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"G.\u00a0Cormode\u00a0C.\u00a0M.\u00a0Procopiuc D.\u00a0Srivastava and T.\u00a0T.\u00a0L.\u00a0Tran. 2012. Differentially private publication of sparse data. ICDT (2012).","DOI":"10.1145\/2274576.2274608"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"C. Dwork. 2006. Differential privacy. ICALP (2006) 1\u201312.","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"B.\u00a0Barak K.\u00a0Chaudhuri C.\u00a0Dwork\u00a0S.\u00a0Kale F.\u00a0McSherry and K.\u00a0Talwar. 2007. Privacy accuracy and consistency too: a holistic solution to contingency table release. PODS (2007) 273\u2013\u2013282.","DOI":"10.1145\/1265530.1265569"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Arik Friedman and Assaf Schuster. 2010. Data Mining with Differential Privacy. 10.1145\/1835804.1835868. (2010) 493\u2013502. 10.1145\/1835804.1835868","DOI":"10.1145\/1835804.1835868"},{"key":"e_1_3_3_2_10_2","unstructured":"Fuzzy\u00a0Logic Fundamentals. March 2001. chapter 3. 61\u201384\u00a0pages."},{"key":"e_1_3_3_2_11_2","unstructured":"E.\u00a0Shen D.\u00a0Srivastava G.\u00a0Cormode C.\u00a0M.\u00a0Procopiuc and T. Yu. 2012. Differentially private spatial decompositions. ICDE (2012)."},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"X.\u00a0Xiao G.\u00a0Wang and J.\u00a0Gehrke. 2010. Differential privacy via wavelet transforms. ICDE (2010) 225\u2013236.","DOI":"10.1109\/ICDE.2010.5447831"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"C.\u00a0M.\u00a0Procopiuc G.\u00a0Yaroslavtsev G.\u00a0Cormode and D. Srivastava. 2013. Accurate and efficient private release of datacubes and contingency tables. ICDE (2013) 745\u2013\u2013756.","DOI":"10.1109\/ICDE.2013.6544871"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"M.\u00a0Winslett\u00a0X.\u00a0Xiao\u00a0Y.\u00a0Yang G.\u00a0Yuan Z.\u00a0Zhang and Z. Hao. 2012. Low-rank mechanism: Optimizing batch queries under differential privacy. PVLDB 5 11 (2012) 1352\u2013\u20131363.","DOI":"10.14778\/2350229.2350252"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"B.\u00a0Ding\u00a0M.\u00a0Winslett J.\u00a0Han and Z.\u00a0Li. 2011. Differentially private data cubes: optimizing noise sources and consistency. SIGMOD (2011) 217\u2013228.","DOI":"10.1145\/1989323.1989347"},{"key":"e_1_3_3_2_16_2","unstructured":"C.\u00a0M.\u00a0Procopiuc\u00a0D.\u00a0Srivastava J.\u00a0Zhang G.\u00a0Cormode and X. Xiao. 2014. PrivBayes: Private Data Release via Bayesian Networks. SIGMOD (2014) 1423\u20131434."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Yang\u00a0Z.\u00a0Zhang J.\u00a0Zhang X.\u00a0Xiao and M. Winslett. 2013. PrivGene: differentially private model fitting using genetic algorithms. SIGMOD (2013) 665\u2013676.","DOI":"10.1145\/2463676.2465330"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Priyank Jain Manasi Gyanchandani and Nilay Khare. 2016. Big data privacy: a technological perspective and review. Journal of Big Data 3 1 (2016) 25.","DOI":"10.1186\/s40537-016-0059-y"},{"key":"e_1_3_3_2_19_2","unstructured":"V. Janis. 1998. Fuzzy Mappings And Fuzzy Methods For Crisp Mappings. http:\/\/actamath.savbb.sk\/pdf\/acta0604.pdf. 31\u201347\u00a0pages."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"Michiel\u00a0J.W. Jansen. 1998. Prediction error through modelling concepts and uncertainty from basic data. Nutrient Cycling in Agroecosystems 50 1 (1998) 247\u2013253. 10.1023\/A:1009748529970","DOI":"10.1023\/A:1009748529970"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"C. Li and G. Miklau. 2012. An adaptive mechanism for accurate query answering under differential privacy. PVLDB 5 6 (2012) 514\u2013\u2013525.","DOI":"10.14778\/2168651.2168653"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"C. Li and G. Miklau. 2013. Optimal error of query sets under the differentially-private matrix mechanism. ICDT (2013) 272\u2013\u2013283.","DOI":"10.1145\/2448496.2448529"},{"key":"e_1_3_3_2_23_2","unstructured":"M. Lichman. 2013. UCI Machine Learning Repository: Adult. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Adult."},{"key":"e_1_3_3_2_24_2","unstructured":"M. Lichman. 2013. UCI Machine Learning Repository: Connect-4. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Connect-4."},{"key":"e_1_3_3_2_25_2","unstructured":"M. Lichman. 2013. UCI Machine Learning Repository: SIFT10M. http:\/\/archive.ics.uci.edu\/ml\/datasets\/SIFT10M."},{"key":"e_1_3_3_2_26_2","unstructured":"K.\u00a0Ligett M.\u00a0Hardt and F. McSherry. 2012. A simple and practical algorithm for differentially private data release. NIPS (2012) 2348\u2013\u20132356."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"G.\u00a0Miklau M.\u00a0Hay V.\u00a0Rastogi and D. Suciu. 2010. Boosting the accuracy of differentially private histograms through consistency. PVLDB 3 1 (2010) 1021\u20131032.","DOI":"10.14778\/1920841.1920970"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"F. McSherry and I. Mironov. 2009. Differentially private recommender systems: Building privacy into the netflix prize contenders. KDD (2009) 627\u2013\u2013636.","DOI":"10.1145\/1557019.1557090"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"D.\u00a0Su N.\u00a0Li W.\u00a0Qardaji and J. Cao. 2012. Privbasis: Frequent itemset mining with differential privacy. PVLDB 5 11 (2012) 1340\u20131351.","DOI":"10.14778\/2350229.2350251"},{"key":"e_1_3_3_2_31_2","unstructured":"C.\u00a0L. Oak. 2013. Uncertainity in Measurement: Noise and How to deal with it. Intermediate Lab Manual (2013) 1\u201318."},{"key":"e_1_3_3_2_32_2","unstructured":"A\u00a0Study on Privacy Preserving Data Publishing With Differential\u00a0Privacy. [n.d.]. https:\/\/harvest.usask.ca\/items\/64349ba3-d5a0-487f-bcf4-6076b8677e7b."},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"A.\u00a0Smith R.\u00a0Bhaskar S.\u00a0Laxman and A. Thakurta. 2010. Discovering frequent patterns in sensitive data. KDD (2010) 503\u2013512.","DOI":"10.1145\/1835804.1835869"},{"key":"e_1_3_3_2_34_2","unstructured":"S.\u00a0Prabhakar R.\u00a0Cheng. 2004. Using uncertainty to provide privacy-preserving and high-quality location-based services. Workshop on Location Systems Privacy and Control MobileHCI (2004) 1\u20134."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"V. Rastogi and S. Nath. 2010. Differentially private aggregation of distributed time-series with transformation and encryption. SIGMOD (2010) 735\u2013\u2013746.","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_3_3_2_36_2","unstructured":"Statlib. NLTCS. http:\/\/lib.stat.cmu.edu\/datasets\/."},{"key":"e_1_3_3_2_37_2","unstructured":"FELIX\u00a0T. WU.2013. Defining Privacy and Utility in Datasets. University of Colorado Law Review 84 (2013) 1118\u20131152."},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"L. Zadeh. 1965. Fuzzy sets. Journal of Information and Control 8 (1965) 338\u2013353.","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Lotfi\u00a0A. Zadeh. 1997. Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic. Fuzzy Sets and Systems 90 2 (1997) 111 \u2013 127. 10.1016\/S0165-0114(97)00077-8Fuzzy Sets: Where Do We Stand? Where Do We Go?","DOI":"10.1016\/S0165-0114(97)00077-8"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723188","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:46Z","timestamp":1750298206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":38,"alternative-id":["10.1145\/3723178.3723188","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723188","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}