Results 21 to 30 of about 47,575 (276)
Towards trajectory anonymization: a generalization-based approach [PDF]
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets.
Atzori, Maurizio +5 more
core +2 more sources
De-anonymiation method for networks based on DeepLink
Existing de-anonymization technologies are mainly based on the network structure. To learn and express network structure is the key step of de-anonymization.
WANG Pei, JIA Yan, LI Aiping, JIANG Qianyue
doaj +3 more sources
CIAGAN: Conditional Identity Anonymization Generative Adversarial Networks
The unprecedented increase in the usage of computer vision technology in society goes hand in hand with an increased concern in data privacy. In many real-world scenarios like people tracking or action recognition, it is important to be able to process ...
Elezi, Ismail +2 more
core +1 more source
Facial Feature Removal for Anonymization of Neurological Image Data
Interdisciplinary exchange of medical datasets between clinicians and engineers is essential for clinical research. Due to the Data Protection Act, which preserves the rights of patients, full anonymization is necessary before any exchange can take place.
Gießler Fina +4 more
doaj +1 more source
Understanding structure-based social network de-anonymization techniques via empirical analysis
The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on their wellness activities.
Jian Mao +5 more
doaj +1 more source
Privacy Preservation by Disassociation [PDF]
In this work, we focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multidimensional anonymization techniquesa) protect the privacy of users either by altering the set of quasi-identifiers of the ...
Liagouris, John +3 more
core +2 more sources
The research of the preserving privacy of sensitive information has been popular recently. Many researches about the techniques of generalizing records under k-anonymity rules have been done. Considering that data anonymity requires a lot of time and resources, it would be important to decide whether a table is vulnerable to privacy attacks before ...
Min-Kyoung Jung, Dong-Kweon Hong
openaire +1 more source
An Automated Social Graph De-anonymization Technique [PDF]
We present a generic and automated approach to re-identifying nodes in anonymized social networks which enables novel anonymization techniques to be quickly evaluated.
Criminisi A. +3 more
core +1 more source
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
Anonymization techniques are widely used to make personal data broadly available for analytics/data-mining purposes while preserving the privacy of the personal information enclosed in it.
Abdul Majeed
doaj +1 more source
Background. As more data becomes available about how frequently the cloud can be updated, a more comprehensive picture of its safety is emerging. The suggested artworks use a cloud-based gradual clustering device to cluster and refresh a large number of ...
Sindhe Phani Kumar, R. Anandan
doaj +1 more source

