{"id":"https://openalex.org/W2015188410","doi":"https://doi.org/10.1145/2618243.2618269","title":"(k, d)-core anonymity","display_name":"(k, d)-core anonymity","publication_year":2014,"publication_date":"2014-06-24","ids":{"openalex":"https://openalex.org/W2015188410","doi":"https://doi.org/10.1145/2618243.2618269","mag":"2015188410"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2618243.2618269","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004072318","display_name":"Roland Assam","orcid":null},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Roland Assam","raw_affiliation_strings":["RWTH Aachen University, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001473233","display_name":"Marwan Hassani","orcid":"https://orcid.org/0000-0002-4027-4351"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Marwan Hassani","raw_affiliation_strings":["RWTH Aachen University, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077829526","display_name":"Michael Brysch","orcid":null},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Brysch","raw_affiliation_strings":["RWTH Aachen University, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003335849","display_name":"Thomas Seidl","orcid":"https://orcid.org/0000-0002-4861-1412"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Seidl","raw_affiliation_strings":["RWTH Aachen University, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University, Germany","institution_ids":["https://openalex.org/I887968799"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.366,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.817488,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Internet Users' Information Privacy Concerns","score":0.9848,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-Anonymity","score":0.620154},{"id":"https://openalex.org/keywords/anonymization","display_name":"Anonymization","score":0.600648},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.600284},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential Privacy","score":0.515407},{"id":"https://openalex.org/keywords/privacy-concerns","display_name":"Privacy Concerns","score":0.503522}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.85350066},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76794964},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.7604784},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.55815226},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5168917},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.46373287},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4445438},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3889217},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15199438},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10498008},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2618243.2618269","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W1549249733","https://openalex.org/W1587629899","https://openalex.org/W1635909395","https://openalex.org/W192312889","https://openalex.org/W1980683432","https://openalex.org/W1992461601","https://openalex.org/W1997421642","https://openalex.org/W1998091733","https://openalex.org/W2000133061","https://openalex.org/W2026160696","https://openalex.org/W2032186932","https://openalex.org/W20667085","https://openalex.org/W2096296626","https://openalex.org/W2124637492","https://openalex.org/W2124849257","https://openalex.org/W2128248866","https://openalex.org/W2134167315","https://openalex.org/W2142599626","https://openalex.org/W2150256170","https://openalex.org/W2163263459","https://openalex.org/W2168433392","https://openalex.org/W2404597403","https://openalex.org/W2406036028","https://openalex.org/W3125564681"],"related_works":["https://openalex.org/W3105058304","https://openalex.org/W2381086482","https://openalex.org/W2355715322","https://openalex.org/W2353100240","https://openalex.org/W223766737","https://openalex.org/W2108805307","https://openalex.org/W2057844631","https://openalex.org/W2010323877","https://openalex.org/W1987868057","https://openalex.org/W14791348"],"abstract_inverted_index":{"Networks":[0],"entail":[1],"vulnerable":[2],"and":[3,54,58,120,133,142],"sensitive":[4],"information":[5],"that":[6,106,149],"pose":[7],"serious":[8],"privacy":[9,33],"threats.":[10],"In":[11,61],"this":[12,101],"paper,":[13],"we":[14,124],"introduce,":[15],"k-core":[16,26,52],"attack,":[17],"a":[18,40,153],"new":[19],"attack":[20,30,53],"model":[21],"which":[22,49],"stems":[23],"from":[24],"the":[25,32,51,76,96,103,126],"decomposition":[27],"principle.":[28],"K-core":[29],"undermines":[31],"of":[34,78,98,128],"some":[35],"state-of-the-art":[36,154],"techniques.":[37],"We":[38],"propose":[39],"novel":[41],"structural":[42,111],"anonymization":[43,77,113],"technique":[44,105,130],"called":[45],"(k,":[46,87],"\u03b4)-Core":[47,88],"Anonymity,":[48],"harnesses":[50],"structurally":[55],"anonymizes":[56],"small":[57,132],"large":[59,134],"networks.":[60,94,116],"addition,":[62],"although":[63],"real-world":[64],"social":[65],"networks":[66,79,135],"are":[67],"massive":[68,93,115],"in":[69,156],"nature,":[70],"most":[71],"existing":[72],"works":[73],"focus":[74],"on":[75,110,131],"with":[80,136],"less":[81],"than":[82],"one":[83],"hundred":[84],"thousand":[85],"nodes.":[86],"Anonymity":[89],"is":[90,102],"tailored":[91],"for":[92,114],"To":[95],"best":[97],"our":[99,129,150],"knowledge,":[100],"first":[104],"provides":[107],"empirical":[108],"studies":[109],"network":[112],"Using":[117],"three":[118],"real":[119],"two":[121],"synthetic":[122],"datasets,":[123],"demonstrate":[125],"effectiveness":[127],"up":[137],"to":[138],"1.7":[139],"million":[140,144],"nodes":[141],"17.8":[143],"edges.":[145],"Our":[146],"experiments":[147],"reveal":[148],"approach":[151],"outperforms":[152],"work":[155],"several":[157],"aspects.":[158]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2015188410","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2024-11-04T16:15:15.146861","created_date":"2016-06-24"}