Results 21 to 30 of about 47,575 (276)

Towards trajectory anonymization: a generalization-based approach [PDF]

open access: yes, 2009
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets.
Atzori, Maurizio   +5 more
core   +2 more sources

De-anonymiation method for networks based on DeepLink

open access: yes网络与信息安全学报, 2020
Existing de-anonymization technologies are mainly based on the network structure. To learn and express network structure is the key step of de-anonymization.
WANG Pei, JIA Yan, LI Aiping, JIANG Qianyue
doaj   +3 more sources

CIAGAN: Conditional Identity Anonymization Generative Adversarial Networks

open access: yes, 2020
The unprecedented increase in the usage of computer vision technology in society goes hand in hand with an increased concern in data privacy. In many real-world scenarios like people tracking or action recognition, it is important to be able to process ...
Elezi, Ismail   +2 more
core   +1 more source

Facial Feature Removal for Anonymization of Neurological Image Data

open access: yesCurrent Directions in Biomedical Engineering, 2021
Interdisciplinary exchange of medical datasets between clinicians and engineers is essential for clinical research. Due to the Data Protection Act, which preserves the rights of patients, full anonymization is necessary before any exchange can take place.
Gießler Fina   +4 more
doaj   +1 more source

Understanding structure-based social network de-anonymization techniques via empirical analysis

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on their wellness activities.
Jian Mao   +5 more
doaj   +1 more source

Privacy Preservation by Disassociation [PDF]

open access: yes, 2012
In this work, we focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multidimensional anonymization techniquesa) protect the privacy of users either by altering the set of quasi-identifiers of the ...
Liagouris, John   +3 more
core   +2 more sources

Data Anonymity Decision [PDF]

open access: yesJournal of Korean Institute of Intelligent Systems, 2010
The research of the preserving privacy of sensitive information has been popular recently. Many researches about the techniques of generalizing records under k-anonymity rules have been done. Considering that data anonymity requires a lot of time and resources, it would be important to decide whether a table is vulnerable to privacy attacks before ...
Min-Kyoung Jung, Dong-Kweon Hong
openaire   +1 more source

An Automated Social Graph De-anonymization Technique [PDF]

open access: yes, 2014
We present a generic and automated approach to re-identifying nodes in anonymized social networks which enables novel anonymization techniques to be quickly evaluated.
Criminisi A.   +3 more
core   +1 more source

Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review

open access: yesJournal of Cybersecurity and Privacy, 2023
Anonymization techniques are widely used to make personal data broadly available for analytics/data-mining purposes while preserving the privacy of the personal information enclosed in it.
Abdul Majeed
doaj   +1 more source

Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing

open access: yesJournal of Function Spaces, 2022
Background. As more data becomes available about how frequently the cloud can be updated, a more comprehensive picture of its safety is emerging. The suggested artworks use a cloud-based gradual clustering device to cluster and refresh a large number of ...
Sindhe Phani Kumar, R. Anandan
doaj   +1 more source

Home - About - Disclaimer - Privacy