Results 31 to 40 of about 52,169 (277)
MI Loss Evaluation Model for k-Anonymity in PPDM [PDF]
Privacy Preserving Data Mining(PPDM) uses methods such as anonymization to allow data owners to safely publish data sets that are effectively available in data mining without revealing private information.The k-anonymity algorithm, one of the most widely
GU Qingzhu, DONG Hongbin
doaj +1 more source
Preserving prosumer privacy in a district level smart grid [PDF]
This study presents the anonymization of consumer data in a district-level smart grid using the k-anonymity approach. The data utilized in this study covers the demographic information and associated energy consumption of consumers.
Mourshed, Monjur +3 more
core +2 more sources
Data anonymization is a technique that safeguards individuals’ privacy by modifying attribute values in published data. However, increased modifications enhance privacy but diminish the utility of published data, necessitating a balance between privacy ...
Reza Ahmadi Khatir +2 more
doaj +1 more source
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
This paper presents a privacy persevering framework for a decentralized stock exchange platform, ensuring anonymity and unlinkability of the investors’ accounts and their respective trading activities.
Hamed Al-Shaibani +3 more
doaj +1 more source
Efficient location privacy-aware forwarding in opportunistic mobile networks [PDF]
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over ...
Benslimane, Abderrahim +2 more
core +2 more sources
This study is a quantitative study that aims to determine the relationship between anonymity and moral disengagement with cyberbullying behavior in K-Pop fans who do fanwar.
Erfira Khoiriyah, Ridwan Budi Pramono
doaj +1 more source
Optimization-Based k-Anonymity Algorithms
<p>In this paper we present a formulation of <em>k</em>-anonymity as a mathematical <a href="https://www.sciencedirect.com/topics/computer-science/optimization-problem" target="_blank">optimization problem</a>. In solving this formulated problem, <em>k</em>-anonymity is achieved while maximizing the utility of ...
Yuting Liang, Reza Samavi
openaire +1 more source
Resolving the Complexity of Some Data Privacy Problems
We formally study two methods for data sanitation that have been used extensively in the database community: k-anonymity and l-diversity. We settle several open problems concerning the difficulty of applying these methods optimally, proving both positive
Blocki, Jeremiah, Williams, Ryan
core +1 more source
k-anonymous Microdata Release via Post Randomisation Method
The problem of the release of anonymized microdata is an important topic in the fields of statistical disclosure control (SDC) and privacy preserving data publishing (PPDP), and yet it remains sufficiently unsolved.
Chida, Koji +3 more
core +1 more source
Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix
Check-in service, being one of the most popular services in Mobile Social Network Services (MSNS), has serious personal privacy leakage threats. In this paper check-in sequences of pseudonym users were buffered, and a bit matrix for buffered check-in ...
Wen Chen
doaj +1 more source

