Results 31 to 40 of about 52,169 (277)

MI Loss Evaluation Model for k-Anonymity in PPDM [PDF]

open access: yesJisuanji gongcheng, 2022
Privacy Preserving Data Mining(PPDM) uses methods such as anonymization to allow data owners to safely publish data sets that are effectively available in data mining without revealing private information.The k-anonymity algorithm, one of the most widely
GU Qingzhu, DONG Hongbin
doaj   +1 more source

Preserving prosumer privacy in a district level smart grid [PDF]

open access: yes, 2016
This study presents the anonymization of consumer data in a district-level smart grid using the k-anonymity approach. The data utilized in this study covers the demographic information and associated energy consumption of consumers.
Mourshed, Monjur   +3 more
core   +2 more sources

Designing a Novel Approach Using a Greedy and Information-Theoretic Clustering-Based Algorithm for Anonymizing Microdata Sets

open access: yesEntropy, 2023
Data anonymization is a technique that safeguards individuals’ privacy by modifying attribute values in published data. However, increased modifications enhance privacy but diminish the utility of published data, necessitating a balance between privacy ...
Reza Ahmadi Khatir   +2 more
doaj   +1 more source

Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform

open access: yesIEEE Access, 2022
This paper presents a privacy persevering framework for a decentralized stock exchange platform, ensuring anonymity and unlinkability of the investors’ accounts and their respective trading activities.
Hamed Al-Shaibani   +3 more
doaj   +1 more source

Efficient location privacy-aware forwarding in opportunistic mobile networks [PDF]

open access: yes, 2014
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over ...
Benslimane, Abderrahim   +2 more
core   +2 more sources

Hubungan antara Anonimitas dan Moral Disengagement dengan Perilaku Cyberbullying pada Penggemar K-Pop yang Melakukan Fanwar

open access: yesJurnal Psikologi Perseptual, 2023
This study is a quantitative study that aims to determine the relationship between anonymity and moral disengagement with cyberbullying behavior in K-Pop fans who do fanwar.
Erfira Khoiriyah, Ridwan Budi Pramono
doaj   +1 more source

Optimization-Based k-Anonymity Algorithms

open access: yesComputers & Security, 2020
<p>In this paper we present a formulation of <em>k</em>-anonymity as a mathematical <a href="https://www.sciencedirect.com/topics/computer-science/optimization-problem" target="_blank">optimization problem</a>. In solving this formulated problem, <em>k</em>-anonymity is achieved while maximizing the utility of ...
Yuting Liang, Reza Samavi
openaire   +1 more source

Resolving the Complexity of Some Data Privacy Problems

open access: yes, 2010
We formally study two methods for data sanitation that have been used extensively in the database community: k-anonymity and l-diversity. We settle several open problems concerning the difficulty of applying these methods optimally, proving both positive
Blocki, Jeremiah, Williams, Ryan
core   +1 more source

k-anonymous Microdata Release via Post Randomisation Method

open access: yes, 2015
The problem of the release of anonymized microdata is an important topic in the fields of statistical disclosure control (SDC) and privacy preserving data publishing (PPDP), and yet it remains sufficiently unsolved.
Chida, Koji   +3 more
core   +1 more source

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

open access: yesCybernetics and Information Technologies, 2015
Check-in service, being one of the most popular services in Mobile Social Network Services (MSNS), has serious personal privacy leakage threats. In this paper check-in sequences of pseudonym users were buffered, and a bit matrix for buffered check-in ...
Wen Chen
doaj   +1 more source

Home - About - Disclaimer - Privacy