{"id":"https://openalex.org/W2573983252","doi":"https://doi.org/10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0057","title":"Fine-Grained Delta Privacy Preservation for Hierarchical Contexts","display_name":"Fine-Grained Delta Privacy Preservation for Hierarchical Contexts","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2573983252","doi":"https://doi.org/10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0057","mag":"2573983252"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100763211","display_name":"Xue Jiang","orcid":"https://orcid.org/0000-0002-1422-9258"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xue Jiang","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102718047","display_name":"Yu Huang","orcid":"https://orcid.org/0000-0001-8921-036X"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Huang","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071661810","display_name":"Hengfeng Wei","orcid":"https://orcid.org/0000-0002-0427-9710"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hengfeng Wei","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":"53","issue":null,"first_page":"261","last_page":"268"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10444","display_name":"Activity Recognition in Pervasive Computing Environments","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10444","display_name":"Activity Recognition in Pervasive Computing Environments","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Delay-Tolerant Networking in Mobile Ad Hoc Networks","score":0.995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential Privacy","score":0.561237},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.513779},{"id":"https://openalex.org/keywords/context-aware-applications","display_name":"Context-Aware Applications","score":0.506496},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.41063648}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79842556},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7520732},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.68351334},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.63840675},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5865918},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5625917},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.5381786},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5200281},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.513779},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47781947},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.43951124},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.41063648},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.08466813},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.47,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1481162702","https://openalex.org/W1510817841","https://openalex.org/W1584714745","https://openalex.org/W1958015329","https://openalex.org/W2007321142","https://openalex.org/W2023815876","https://openalex.org/W2032005922","https://openalex.org/W2070580791","https://openalex.org/W2075840228","https://openalex.org/W2077574412","https://openalex.org/W2103388129","https://openalex.org/W2106520282","https://openalex.org/W2109507061","https://openalex.org/W2117417568","https://openalex.org/W2119320829","https://openalex.org/W2137100320","https://openalex.org/W2140190241","https://openalex.org/W2159024459","https://openalex.org/W2165209655","https://openalex.org/W2166692930","https://openalex.org/W2769353087"],"related_works":["https://openalex.org/W4396832952","https://openalex.org/W4300474583","https://openalex.org/W4225340788","https://openalex.org/W3022534164","https://openalex.org/W3015944045","https://openalex.org/W3013058036","https://openalex.org/W2972172135","https://openalex.org/W2951971312","https://openalex.org/W2116878667","https://openalex.org/W1591172238"],"abstract_inverted_index":{"Rich":[0],"contexts":[1,110],"enable":[2],"the":[3,25,36,40,56,70,88],"provision":[4],"of":[5,17,38,42,72,75],"context-aware":[6],"services":[7],"on":[8,96],"mobile":[9],"smart":[10,98],"phones,":[11],"but":[12],"they":[13],"also":[14],"introduce":[15],"threats":[16],"privacy":[18,28,49,66,113],"leakages.":[19],"It":[20],"is":[21,30],"widely":[22],"held":[23],"that":[24,50,103],"key":[26],"to":[27,31,54],"preservation":[29,41],"achieve":[32],"efficient":[33],"tradeoffs":[34],"between":[35],"utilization":[37],"contexts,":[39],"privacy.":[43,93,124],"G\u00f6tz":[44],"et":[45],"al.":[46],"present":[47],"\u03b4":[48,65,92,112],"exploits":[51],"temporal":[52],"relation":[53],"decide":[55],"release/suppression,":[57],"this":[58,78],"technique":[59],"achieves":[60],"a":[61,107],"good":[62],"tradeoff.":[63],"However,":[64],"does":[67],"not":[68],"consider":[69],"hierarchy":[71],"different":[73],"layers":[74],"contexts.":[76],"In":[77],"paper,":[79],"we":[80],"propose":[81],"FDH":[82,104],"which":[83],"provides":[84],"fine-grained":[85],"suppression":[86,109],"over":[87],"context":[89,100],"hierarchy,":[90],"integrates":[91],"Our":[94],"experiments":[95],"real":[97],"phone":[99],"traces":[101],"show":[102],"can":[105],"release":[106],"few":[108],"in":[111],"with":[114],"limited":[115],"cost,":[116],"obtain":[117],"relatively":[118],"high":[119],"utility":[120],"while":[121],"preserving":[122],"strong":[123]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2573983252","counts_by_year":[],"updated_date":"2024-10-13T18:23:28.733941","created_date":"2017-01-26"}