Results 21 to 30 of about 54,372 (262)
Towards trajectory anonymization: a generalization-based approach [PDF]
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets.
Atzori, Maurizio +5 more
core +2 more sources
Understanding structure-based social network de-anonymization techniques via empirical analysis
The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on their wellness activities.
Jian Mao +5 more
doaj +1 more source
De-anonymiation method for networks based on DeepLink
Existing de-anonymization technologies are mainly based on the network structure. To learn and express network structure is the key step of de-anonymization.
WANG Pei, JIA Yan, LI Aiping, JIANG Qianyue
doaj +1 more source
CIAGAN: Conditional Identity Anonymization Generative Adversarial Networks
The unprecedented increase in the usage of computer vision technology in society goes hand in hand with an increased concern in data privacy. In many real-world scenarios like people tracking or action recognition, it is important to be able to process ...
Elezi, Ismail +2 more
core +1 more source
Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks [PDF]
Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-tomany structures are evolved due to need for conveying collected event information to ...
Bahsi, Hayretdin +2 more
core +1 more source
Algorithms to anonymize structured medical and healthcare data: A systematic review
Introduction: With many anonymization algorithms developed for structured medical health data (SMHD) in the last decade, our systematic review provides a comprehensive bird’s eye view of algorithms for SMHD anonymization.Methods: This systematic review ...
Ali Sepas +6 more
doaj +1 more source
Quantification of De-anonymization Risks in Social Networks
The risks of publishing privacy-sensitive data have received considerable attention recently. Several de-anonymization attacks have been proposed to re-identify individuals even if data anonymization techniques were applied.
Ji, Shouling +4 more
core +1 more source
Publishing Microdata with a Robust Privacy Guarantee [PDF]
Today, the publication of microdata poses a privacy threat. Vast research has striven to define the privacy condition that microdata should satisfy before it is released, and devise algorithms to anonymize the data so as to achieve this condition.
Cao, Jianneng, Karras, Panagiotis
core +2 more sources
Data anonymization is an essential prerequisite that enables data sharing in a privacy-preserving manner. However, anonymization affects the quality of the data and thus might affect the performance of later conducted data analysis.
Roland Stenger +4 more
doaj +1 more source
Personal data have been increasingly used in data-driven applications to improve quality of life. However, privacy preservation of personal data while sharing it with analysts/ researchers has become an essential requirement to be met by data owners ...
Abdul Majeed, Seong Oun Hwang
doaj +1 more source

