Results 31 to 40 of about 24,103,638 (294)

Information theoretic-based privacy risk evaluation for data anonymization

open access: yesJournal of Surveillance, Security and Safety, 2021
Aim: Data anonymization aims to enable data publishing without compromising the individuals’ privacy. The reidentification and sensitive information inference risks of a dataset are important factors in the decision-making process for the techniques and ...
Anis Bkakria   +3 more
semanticscholar   +1 more source

De-anonymiation method for networks based on DeepLink

open access: yes网络与信息安全学报, 2020
Existing de-anonymization technologies are mainly based on the network structure. To learn and express network structure is the key step of de-anonymization.
WANG Pei, JIA Yan, LI Aiping, JIANG Qianyue
doaj   +3 more sources

Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding

open access: yesIEEE Transactions on Information Forensics and Security, 2021
Recent advances in intelligent surveillance systems have enabled a new era of smart monitoring in a wide range of applications from health monitoring to homeland security.
Mehmet Yamaç   +5 more
semanticscholar   +1 more source

Facial Feature Removal for Anonymization of Neurological Image Data

open access: yesCurrent Directions in Biomedical Engineering, 2021
Interdisciplinary exchange of medical datasets between clinicians and engineers is essential for clinical research. Due to the Data Protection Act, which preserves the rights of patients, full anonymization is necessary before any exchange can take place.
Gießler Fina   +4 more
doaj   +1 more source

Flexible data anonymization using ARX—Current status and challenges ahead

open access: yesSoftware, Practice & Experience, 2020
The race for innovation has turned into a race for data. Rapid developments of new technologies, especially in the field of artificial intelligence, are accompanied by new ways of accessing, integrating, and analyzing sensitive personal data.
Fabian Prasser   +4 more
semanticscholar   +1 more source

Understanding structure-based social network de-anonymization techniques via empirical analysis

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on their wellness activities.
Jian Mao   +5 more
doaj   +1 more source

Data Anonymity Decision [PDF]

open access: yesJournal of Korean Institute of Intelligent Systems, 2010
The research of the preserving privacy of sensitive information has been popular recently. Many researches about the techniques of generalizing records under k-anonymity rules have been done. Considering that data anonymity requires a lot of time and resources, it would be important to decide whether a table is vulnerable to privacy attacks before ...
Min-Kyoung Jung, Dong-Kweon Hong
openaire   +1 more source

Scalable Distributed Data Anonymization

open access: yes2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021
We present an approach for enabling a distributed anonymization process over large collections of sensor data. Our approach anonymizes large datasets (which might not fit in main memory) using an arbitrary number of workers within the Spark framework. We
S. Vimercati   +6 more
semanticscholar   +1 more source

Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review

open access: yesJournal of Cybersecurity and Privacy, 2023
Anonymization techniques are widely used to make personal data broadly available for analytics/data-mining purposes while preserving the privacy of the personal information enclosed in it.
Abdul Majeed
doaj   +1 more source

Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing

open access: yesJournal of Function Spaces, 2022
Background. As more data becomes available about how frequently the cloud can be updated, a more comprehensive picture of its safety is emerging. The suggested artworks use a cloud-based gradual clustering device to cluster and refresh a large number of ...
Sindhe Phani Kumar, R. Anandan
doaj   +1 more source

Home - About - Disclaimer - Privacy