Results 31 to 40 of about 24,103,638 (294)
Information theoretic-based privacy risk evaluation for data anonymization
Aim: Data anonymization aims to enable data publishing without compromising the individuals’ privacy. The reidentification and sensitive information inference risks of a dataset are important factors in the decision-making process for the techniques and ...
Anis Bkakria +3 more
semanticscholar +1 more source
De-anonymiation method for networks based on DeepLink
Existing de-anonymization technologies are mainly based on the network structure. To learn and express network structure is the key step of de-anonymization.
WANG Pei, JIA Yan, LI Aiping, JIANG Qianyue
doaj +3 more sources
Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding
Recent advances in intelligent surveillance systems have enabled a new era of smart monitoring in a wide range of applications from health monitoring to homeland security.
Mehmet Yamaç +5 more
semanticscholar +1 more source
Facial Feature Removal for Anonymization of Neurological Image Data
Interdisciplinary exchange of medical datasets between clinicians and engineers is essential for clinical research. Due to the Data Protection Act, which preserves the rights of patients, full anonymization is necessary before any exchange can take place.
Gießler Fina +4 more
doaj +1 more source
Flexible data anonymization using ARX—Current status and challenges ahead
The race for innovation has turned into a race for data. Rapid developments of new technologies, especially in the field of artificial intelligence, are accompanied by new ways of accessing, integrating, and analyzing sensitive personal data.
Fabian Prasser +4 more
semanticscholar +1 more source
Understanding structure-based social network de-anonymization techniques via empirical analysis
The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on their wellness activities.
Jian Mao +5 more
doaj +1 more source
The research of the preserving privacy of sensitive information has been popular recently. Many researches about the techniques of generalizing records under k-anonymity rules have been done. Considering that data anonymity requires a lot of time and resources, it would be important to decide whether a table is vulnerable to privacy attacks before ...
Min-Kyoung Jung, Dong-Kweon Hong
openaire +1 more source
Scalable Distributed Data Anonymization
We present an approach for enabling a distributed anonymization process over large collections of sensor data. Our approach anonymizes large datasets (which might not fit in main memory) using an arbitrary number of workers within the Spark framework. We
S. Vimercati +6 more
semanticscholar +1 more source
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
Anonymization techniques are widely used to make personal data broadly available for analytics/data-mining purposes while preserving the privacy of the personal information enclosed in it.
Abdul Majeed
doaj +1 more source
Background. As more data becomes available about how frequently the cloud can be updated, a more comprehensive picture of its safety is emerging. The suggested artworks use a cloud-based gradual clustering device to cluster and refresh a large number of ...
Sindhe Phani Kumar, R. Anandan
doaj +1 more source

