Results 221 to 230 of about 24,103,638 (294)
Some of the next articles are maybe not open access.

A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark

ACM Transactions on Privacy and Security, 2022
Multi-dimensional data anonymization approaches (e.g., Mondrian) ensure more fine-grained data privacy by providing a different anonymization strategy applied for each attribute. Many variations of multi-dimensional anonymization have been implemented on
S. Bazai, Julian Jang, Hooman Alavizadeh
semanticscholar   +1 more source

Guideline for Data Anonymization for Data Privacy in Thailand

International Conference on Information Technology, 2022
PDPA is the first Data protection law in Thailand. The laws have been effectively enforced since June 2022. A data breach is a serious problem for all firms that hold personal data. The other bigger problem is data privacy.
Jiraphat Lapwattanaworakul   +2 more
semanticscholar   +1 more source

Distributed Data Anonymization

2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019
Data generalization is a widely-used privacy technique, in which an accurate value of sensitive information is replaced with a more general representation. The problem of data generalization becomes challenging when data is distributed among several agents, who are interested in releasing their table of data to shape a data mining algorithm on the ...
Martinelli, Fabio, Sheikhalishahi, Mina
openaire   +2 more sources

Impacts of Data Anonymization on Semantic Segmentation

2022 IEEE Intelligent Vehicles Symposium (IV), 2022
For the development of machine learning-based driver assistance systems and highly automated driving functions, training data play a significant role in ensuring machine learning algorithms generalize well on real driving scenarios.
Jingxing Zhou, J. Beyerer
semanticscholar   +1 more source

Side-Channel Attacks on Query-Based Data Anonymization

Conference on Computer and Communications Security, 2021
A longstanding problem in computer privacy is that of data anonymization. One common approach is to present a query interface to analysts, and anonymize on a query-by-query basis.
Franziska Boenisch   +5 more
semanticscholar   +1 more source

k-Anonymous data collection

Information Sciences, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhong, Sheng   +2 more
openaire   +1 more source

Anonymization of Statistical Data

it - Information Technology, 2011
Abstract In the modern digital society, personal information about individuals can be collected, stored, shared and disseminated much more easily and freely. Such data can be released in “macrodata” form, reporting aggregated information, or in “microdata” form, reporting specific information on individual respondents.
S. De Capitani di Vimercati   +3 more
openaire   +2 more sources

Attack Risk Analysis in Data Anonymization in Internet of Things

IEEE Transactions on Computational Social Systems
An enormous volume of data is generated in the Internet of Things (IoT), which needs to be anonymized before sharing with public or third parties to minimize reidentification risk and protect sensitive information.
Tianliu Yang   +3 more
semanticscholar   +1 more source

Patterns of Data Anonymization

European Conference on Pattern Languages of Programs
Over the years, sensitive data has been growing in software systems. To comply with ethical and legal requirements, the General Data Protection Regulation (GDPR) recommends using pseudonymization and anonymization techniques to ensure appropriate ...
Mariana Monteiro   +5 more
semanticscholar   +1 more source

Anonymization: The imperfect science of using data while preserving privacy

Science Advances
Information about us, our actions, and our preferences is created at scale through surveys or scientific studies or as a result of our interaction with digital devices such as smartphones and fitness trackers. The ability to safely share and analyze such
Andrea Gadotti   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy