{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T11:12:52Z","timestamp":1759057972329,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T00:00:00Z","timestamp":1480377600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2016R1D1A1B02011964"],"award-info":[{"award-number":["2016R1D1A1B02011964"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0767-1","type":"journal-article","created":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T12:21:55Z","timestamp":1480422115000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An efficient privacy protection in mobility social network services with novel clustering-based anonymization"],"prefix":"10.1186","volume":"2016","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2586-2913","authenticated-orcid":false,"given":"Zhi-Guo","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ho-Seok","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Shang-Nan","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Sung-Ryul","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,29]]},"reference":[{"issue":"05","key":"767_CR1","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"L Sweeney, k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowledge-Based Syst. 10(05), 557\u2013570 (2002).","journal-title":"Int. J. Uncertain. Fuzziness Knowledge-Based Syst"},{"issue":"05","key":"767_CR2","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"L Sweeney, Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowledge-Based Syst. 10(05), 571\u2013588 (2002).","journal-title":"Int. J. Uncertain. Fuzziness Knowledge-Based Syst"},{"key":"767_CR3","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1145\/1142351.1142374","volume-title":"Proceedings of the Twenty-fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems","author":"G Aggarwal","year":"2006","unstructured":"G Aggarwal, T Feder, K Kenthapadi, S Khuller, R Panigrahy, D Thomas, A Zhu, in Proceedings of the Twenty-fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. Achieving anonymity via clustering (ACMNew York, 2006), pp. 153\u2013162."},{"key":"767_CR4","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1109\/CANDAR.2015.61","volume-title":"2015 Third International Symposium on Computing and Networking (CANDAR)","author":"X Xu","year":"2015","unstructured":"X Xu, M Numao, in 2015 Third International Symposium on Computing and Networking (CANDAR). An efficient generalized clustering method for achieving k-anonymization (IEEESapporo, 2015), pp. 499\u2013502."},{"key":"767_CR5","unstructured":"G Panda, B Tripathy, S Jha, Security aspects in mobile cloud social network services. Int. J. 2(1) (2011)."},{"key":"767_CR6","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/1379287.1379297","volume-title":"Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society","author":"J-L Lin","year":"2008","unstructured":"J-L Lin, M-C Wei, in Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society. An efficient clustering method for k-anonymization (ACMNew York, 2008), pp. 46\u201350."},{"key":"767_CR7","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-540-71703-4_18","volume-title":"Advances in Databases: Concepts, Systems and Applications","author":"J-W Byun","year":"2007","unstructured":"J-W Byun, A Kamra, E Bertino, N Li, in Advances in Databases: Concepts, Systems and Applications. Efficient k-anonymization using clustering techniques (SpringerBerlin, 2007), pp. 188\u2013200."},{"issue":"3","key":"767_CR8","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1009769707641","volume":"2","author":"Z Huang","year":"1998","unstructured":"Z Huang, Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Mining Knowl. Discov. 2(3), 283\u2013304 (1998).","journal-title":"Data Mining Knowl. Discov"},{"issue":"11","key":"767_CR9","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1016\/j.patrec.2004.04.004","volume":"25","author":"DW Kim","year":"2004","unstructured":"DW Kim, KH Lee, D Lee, Fuzzy clustering of categorical data using fuzzy centroids. Pattern Recognit. Lett. 25(11), 1263\u20131271 (2004).","journal-title":"Pattern Recognit. Lett"},{"issue":"2","key":"767_CR10","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1504\/IJRAPIDM.2009.029382","volume":"1","author":"P Kumar","year":"2009","unstructured":"P Kumar, B Tripathy, Mmer: an algorithm for clustering heterogeneous data using rough set theory. Int. J. Rapid Manuf. 1(2), 189\u2013207 (2009).","journal-title":"Int. J. Rapid Manuf"},{"key":"767_CR11","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1109\/RAICS.2011.6069433","volume-title":"Recent Advances in Intelligent Computational Systems (RAICS), 2011 IEEE","author":"B Tripathy","year":"2011","unstructured":"B Tripathy, A Ghosh, in Recent Advances in Intelligent Computational Systems (RAICS), 2011 IEEE. Sdr: An algorithm for clustering categorical data using rough set theory (IEEETrivandrum, 2011), pp. 867\u2013872."},{"key":"767_CR12","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.is.2014.06.008","volume":"48","author":"I-K Park","year":"2015","unstructured":"I-K Park, G-S Choi, Rough set approach for clustering categorical data using information-theoretic dependency measure. Inf. Syst. 48:, 289\u2013295 (2015).","journal-title":"Inf. Syst"},{"key":"767_CR13","first-page":"226","volume-title":"Kdd","author":"M Ester","year":"1996","unstructured":"M Ester, H-P Kriegel, J Sander, X Xu, in Kdd, 96. A density-based algorithm for discovering clusters in large spatial databases with noise (AAAIPortland, 1996), pp. 226\u2013231."},{"issue":"5","key":"767_CR14","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Z Pawlak, Rough sets. Int. J. Comput. Inf. Sci. 11(5), 341\u2013356 (1982).","journal-title":"Int. J. Comput. Inf. Sci"},{"key":"767_CR15","volume-title":"Rough Sets: Theoretical Aspects of Reasoning About Data vol.9","author":"Z Pawlak","year":"2012","unstructured":"Z Pawlak, Rough Sets: Theoretical Aspects of Reasoning About Data vol.9 (Springer Science & Business Media, Berlin, 2012)."},{"key":"767_CR16","unstructured":"TY Lin, N Cercone. Rough Sets and Data Mining: Analysis of Imprecise Data (Springer Science & Business MediaBerlin, 2012)."},{"issue":"8","key":"767_CR17","doi-asserted-by":"publisher","first-page":"3429","DOI":"10.1016\/j.asoc.2013.03.008","volume":"13","author":"Y Kaya","year":"2013","unstructured":"Y Kaya, M Uyar, A hybrid decision support system based on rough set and extreme learning machine for diagnosis of hepatitis disease. Appl. Soft Comput. 13(8), 3429\u20133438 (2013).","journal-title":"Appl. Soft Comput"},{"issue":"9","key":"767_CR18","first-page":"1","volume":"6","author":"BB Nair","year":"2010","unstructured":"BB Nair, V Mohandas, N Sakthivel, A decision tree rough set hybrid system for stock market trend prediction. Int. J. Comput. Appl. 6(9), 1\u20136 (2010).","journal-title":"Int. J. Comput. Appl"},{"issue":"9","key":"767_CR19","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.artint.2010.04.018","volume":"174","author":"Y Qian","year":"2010","unstructured":"Y Qian, J Liang, W Pedrycz, C Dang, Positive approximation: an accelerator for attribute reduction in rough set theory. Artif. Intell. 174(9), 597\u2013618 (2010).","journal-title":"Artif. Intell"},{"issue":"1","key":"767_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"CE Shannon","year":"2001","unstructured":"CE Shannon, A mathematical theory of communication. ACM SIGMOBILE Mobile Comput. Commun. Rev. 5(1), 3\u201355 (2001).","journal-title":"ACM SIGMOBILE Mobile Comput. Commun. Rev"},{"issue":"9","key":"767_CR21","doi-asserted-by":"publisher","first-page":"6338","DOI":"10.1016\/j.eswa.2010.02.087","volume":"37","author":"F Jiang","year":"2010","unstructured":"F Jiang, Y Sui, C Cao, An information entropy-based approach to outlier detection in rough sets. Expert Syst. Appl. 37(9), 6338\u20136344 (2010).","journal-title":"Expert Syst. Appl"},{"issue":"24","key":"767_CR22","first-page":"10501","volume":"8","author":"X Li","year":"1050","unstructured":"X Li, F Rao, An rough entropy based approach to outlier detection. J. Comput. Inf. Syst. 8(24), 10501\u201310508 (1050).","journal-title":"J. Comput. Inf. Syst"},{"key":"767_CR23","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1109\/ICACCI.2013.6637222","volume-title":"Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference On","author":"HV Reddy","year":"2013","unstructured":"HV Reddy, S Viswanadha Raju, P Agrawal, in Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference On. Data labeling method based on cluster purity using relative rough entropy for categorical data clustering (IEEEMysore, 2013), pp. 500\u2013506."},{"key":"767_CR24","unstructured":"L Polkowski, S Tsumoto, TY Lin. Rough set methods and applications: new developments in knowledge discovery in information systems vol.56 Physica (Springer Science & Business MediaBerlin, 2012)."},{"issue":"5","key":"767_CR25","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1080\/03081070701251182","volume":"37","author":"F Jiang","year":"2008","unstructured":"F Jiang, Y Sui, C Cao, A rough set approach to outlier detection[J]. Int. J. General Syst. 37(5), 519\u2013536 (2008).","journal-title":"Int. J. General Syst"},{"key":"767_CR26","volume-title":"A supervised and multivariate discretization algorithm for rough sets[M]\/\/Rough Set and Knowledge Technology","author":"F Jiang","year":"2010","unstructured":"F Jiang, Z Zhao, Y Ge, A supervised and multivariate discretization algorithm for rough sets[M]\/\/Rough Set and Knowledge Technology (Springer, Berlin, Heidelberg, 2010)."},{"key":"767_CR27","unstructured":"Visualizing DBSCAN Clustering. http:\/\/www.naftaliharris.com\/blog\/visualizing-dbscan-clustering\/ . Accessed Jan 2016."},{"key":"767_CR28","first-page":"207","volume-title":"Applications of Digital Information and Web Technologies (ICADIWT), 2014 Fifth International Conference on The","author":"V Panchami","year":"2014","unstructured":"V Panchami, N Radhika, in Applications of Digital Information and Web Technologies (ICADIWT), 2014 Fifth International Conference on The. A novel approach for predicting the length of hospital stay with dbscan and supervised classification algorithms (IEEEBangalore, 2014), pp. 207\u2013212."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0767-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0767-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0767-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T10:33:00Z","timestamp":1657881180000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0767-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,29]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["767"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0767-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,11,29]]},"article-number":"275"}}