Results 21 to 30 of about 54,372 (262)

Towards trajectory anonymization: a generalization-based approach [PDF]

open access: yes, 2009
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets.
Atzori, Maurizio   +5 more
core   +2 more sources

Understanding structure-based social network de-anonymization techniques via empirical analysis

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on their wellness activities.
Jian Mao   +5 more
doaj   +1 more source

De-anonymiation method for networks based on DeepLink

open access: yes网络与信息安全学报, 2020
Existing de-anonymization technologies are mainly based on the network structure. To learn and express network structure is the key step of de-anonymization.
WANG Pei, JIA Yan, LI Aiping, JIANG Qianyue
doaj   +1 more source

CIAGAN: Conditional Identity Anonymization Generative Adversarial Networks

open access: yes, 2020
The unprecedented increase in the usage of computer vision technology in society goes hand in hand with an increased concern in data privacy. In many real-world scenarios like people tracking or action recognition, it is important to be able to process ...
Elezi, Ismail   +2 more
core   +1 more source

Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks [PDF]

open access: yes, 2009
Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-tomany structures are evolved due to need for conveying collected event information to ...
Bahsi, Hayretdin   +2 more
core   +1 more source

Algorithms to anonymize structured medical and healthcare data: A systematic review

open access: yesFrontiers in Bioinformatics, 2022
Introduction: With many anonymization algorithms developed for structured medical health data (SMHD) in the last decade, our systematic review provides a comprehensive bird’s eye view of algorithms for SMHD anonymization.Methods: This systematic review ...
Ali Sepas   +6 more
doaj   +1 more source

Quantification of De-anonymization Risks in Social Networks

open access: yes, 2017
The risks of publishing privacy-sensitive data have received considerable attention recently. Several de-anonymization attacks have been proposed to re-identify individuals even if data anonymization techniques were applied.
Ji, Shouling   +4 more
core   +1 more source

Publishing Microdata with a Robust Privacy Guarantee [PDF]

open access: yes, 2012
Today, the publication of microdata poses a privacy threat. Vast research has striven to define the privacy condition that microdata should satisfy before it is released, and devise algorithms to anonymize the data so as to achieve this condition.
Cao, Jianneng, Karras, Panagiotis
core   +2 more sources

Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility

open access: yesIEEE Access
Data anonymization is an essential prerequisite that enables data sharing in a privacy-preserving manner. However, anonymization affects the quality of the data and thus might affect the performance of later conducted data analysis.
Roland Stenger   +4 more
doaj   +1 more source

Quantifying the Vulnerability of Attributes for Effective Privacy Preservation Using Machine Learning

open access: yesIEEE Access, 2023
Personal data have been increasingly used in data-driven applications to improve quality of life. However, privacy preservation of personal data while sharing it with analysts/ researchers has become an essential requirement to be met by data owners ...
Abdul Majeed, Seong Oun Hwang
doaj   +1 more source

Home - About - Disclaimer - Privacy