Results 221 to 230 of about 24,103,638 (294)
Some of the next articles are maybe not open access.
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark
ACM Transactions on Privacy and Security, 2022Multi-dimensional data anonymization approaches (e.g., Mondrian) ensure more fine-grained data privacy by providing a different anonymization strategy applied for each attribute. Many variations of multi-dimensional anonymization have been implemented on
S. Bazai, Julian Jang, Hooman Alavizadeh
semanticscholar +1 more source
Guideline for Data Anonymization for Data Privacy in Thailand
International Conference on Information Technology, 2022PDPA is the first Data protection law in Thailand. The laws have been effectively enforced since June 2022. A data breach is a serious problem for all firms that hold personal data. The other bigger problem is data privacy.
Jiraphat Lapwattanaworakul +2 more
semanticscholar +1 more source
Distributed Data Anonymization
2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019Data generalization is a widely-used privacy technique, in which an accurate value of sensitive information is replaced with a more general representation. The problem of data generalization becomes challenging when data is distributed among several agents, who are interested in releasing their table of data to shape a data mining algorithm on the ...
Martinelli, Fabio, Sheikhalishahi, Mina
openaire +2 more sources
Impacts of Data Anonymization on Semantic Segmentation
2022 IEEE Intelligent Vehicles Symposium (IV), 2022For the development of machine learning-based driver assistance systems and highly automated driving functions, training data play a significant role in ensuring machine learning algorithms generalize well on real driving scenarios.
Jingxing Zhou, J. Beyerer
semanticscholar +1 more source
Side-Channel Attacks on Query-Based Data Anonymization
Conference on Computer and Communications Security, 2021A longstanding problem in computer privacy is that of data anonymization. One common approach is to present a query interface to analysts, and anonymize on a query-by-query basis.
Franziska Boenisch +5 more
semanticscholar +1 more source
Information Sciences, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhong, Sheng +2 more
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhong, Sheng +2 more
openaire +1 more source
Anonymization of Statistical Data
it - Information Technology, 2011Abstract In the modern digital society, personal information about individuals can be collected, stored, shared and disseminated much more easily and freely. Such data can be released in “macrodata” form, reporting aggregated information, or in “microdata” form, reporting specific information on individual respondents.
S. De Capitani di Vimercati +3 more
openaire +2 more sources
Attack Risk Analysis in Data Anonymization in Internet of Things
IEEE Transactions on Computational Social SystemsAn enormous volume of data is generated in the Internet of Things (IoT), which needs to be anonymized before sharing with public or third parties to minimize reidentification risk and protect sensitive information.
Tianliu Yang +3 more
semanticscholar +1 more source
Patterns of Data Anonymization
European Conference on Pattern Languages of ProgramsOver the years, sensitive data has been growing in software systems. To comply with ethical and legal requirements, the General Data Protection Regulation (GDPR) recommends using pseudonymization and anonymization techniques to ensure appropriate ...
Mariana Monteiro +5 more
semanticscholar +1 more source
Anonymization: The imperfect science of using data while preserving privacy
Science AdvancesInformation about us, our actions, and our preferences is created at scale through surveys or scientific studies or as a result of our interaction with digital devices such as smartphones and fitness trackers. The ability to safely share and analyze such
Andrea Gadotti +4 more
semanticscholar +1 more source

