{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:19:08Z","timestamp":1740158348762,"version":"3.37.3"},"reference-count":20,"publisher":"Wiley","license":[{"start":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:00:00Z","timestamp":1709164800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2022B1515120054","2023-04-04","SCU2023D008"],"award-info":[{"award-number":["2022B1515120054","2023-04-04","SCU2023D008"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100022811","name":"Chinese Academy of Surveying and Mapping","doi-asserted-by":"publisher","award":["2022B1515120054","2023-04-04","SCU2023D008"],"award-info":[{"award-number":["2022B1515120054","2023-04-04","SCU2023D008"]}],"id":[{"id":"10.13039\/100022811","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["2022B1515120054","2023-04-04","SCU2023D008"],"award-info":[{"award-number":["2022B1515120054","2023-04-04","SCU2023D008"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2022B1515120054","2023-04-04","SCU2023D008"],"award-info":[{"award-number":["2022B1515120054","2023-04-04","SCU2023D008"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2024,2,29]]},"abstract":"<jats:p>Negative information selection is an approach to protect the privacy by using negative information to replace original information. In this paper, we prove some bounds for negative information selection. Those bounds reveal the privacy protection strength of quantitative probability analysis. We also analyzed the reconstruction probability of original information from available negative information. The formal analysis can specify the bound on the strength of security and utility for negative information selection. Besides, we simulate brute force attacks under different data leakage ratios. Specifically, we calculate the attacker\u2019s guess times before and after the data leakage. Experimental results indicate that the data leakage of over 30% can put the original information in a dangerous situation. Furthermore, we found that the leakage possibility has little relevance to the number of elements in the full set, but it is influenced by the ratio of the leaked information.<\/jats:p>","DOI":"10.1155\/2024\/7486890","type":"journal-article","created":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T03:50:10Z","timestamp":1709265010000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["The Formal Analysis on Negative Information Selections for Privacy Protection in Data Publishing"],"prefix":"10.1155","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9941-8379","authenticated-orcid":true,"given":"Ping","family":"Chen","sequence":"first","affiliation":[{"name":"China Electronic Product Reliability and Environmental Testing Research Institute, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9332-1992","authenticated-orcid":true,"given":"Jingjing","family":"Hu","sequence":"additional","affiliation":[{"name":"China Electronic Product Reliability and Environmental Testing Research Institute, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9339-7106","authenticated-orcid":true,"given":"Zhitao","family":"Wu","sequence":"additional","affiliation":[{"name":"China Electronic Product Reliability and Environmental Testing Research Institute, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0575-4218","authenticated-orcid":true,"given":"Ruoting","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Computing Sciences, University of East Anglia, Norfolk, Norwich NR47TJ, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8590-1737","authenticated-orcid":true,"given":"Wei","family":"Ren","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR, CASM, Beijing, China"},{"name":"Key Laboratory of Data Protection and Intelligent Management (Sichuan University), Ministry of Education, Beijing, Sichuan, China"},{"name":"School of Computer Science, China University of Geosciences, Wuhan 430078, Hubei, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.spl.2012.10.032"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1186\/s12910-022-00804-w"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3075439"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.008"},{"author":"X. Hu","key":"5","article-title":"Privacy-preserving k-means clustering upon negative databases"},{"article-title":"Negative surveys","year":"2006","author":"F. Esponda","key":"6"},{"author":"R. Liu","key":"7","article-title":"Negative survey-based privacy protection of cloud data"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102206"},{"first-page":"158","article-title":"Limited negative surveys: privacy-preserving participatory sensing","author":"S. Aoki","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.spl.2014.02.011"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2006.00554.x"},{"author":"H. James","key":"12","article-title":"Anonymous data collection in sensor networks"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0147314"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.06.002"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106578"},{"first-page":"1257","article-title":"Negative survey with aggregate scores from multiple questions","author":"Z. Xu","key":"16"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.e97.b.721"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105821"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tetci.2017.2669089"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.05.009"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2024\/7486890.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2024\/7486890.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2024\/7486890.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T03:50:15Z","timestamp":1709265015000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/jece\/2024\/7486890\/"}},"subtitle":[],"editor":[{"given":"Susana","family":"Ortega-Cisneros","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,2,29]]},"references-count":20,"alternative-id":["7486890","7486890"],"URL":"https:\/\/doi.org\/10.1155\/2024\/7486890","relation":{},"ISSN":["2090-0155","2090-0147"],"issn-type":[{"type":"electronic","value":"2090-0155"},{"type":"print","value":"2090-0147"}],"subject":[],"published":{"date-parts":[[2024,2,29]]}}}