Results 51 to 60 of about 12,439,211 (191)

K-Anonymous Privacy Preserving Manifold Learning

open access: yesProceedings of the 20th International Conference on Security and Cryptography, 2023
In this modern world of digitalization, abundant amount of data is being generated. This often leads to data of high dimension, making data points far-away from each other. Such data may contain confidential information and must be protected from disclosure. Preserving privacy of this high-dimensional data is still a challenging problem.
Garg, Sonakshi, Torra, Vicenç
openaire   +2 more sources

Trajectory Clustering and k-NN for Robust Privacy Preserving Spatiotemporal Databases

open access: yesAlgorithms, 2018
In the context of this research work, we studied the problem of privacy preserving on spatiotemporal databases. In particular, we investigated the k-anonymity of mobile users based on real trajectory data.
Elias Dritsas   +3 more
doaj   +1 more source

Efficient Multidimensional Suppression for K-Anonymity [PDF]

open access: yesIEEE Transactions on Knowledge and Data Engineering, 2010
Many applications that employ data mining techniques involve mining data that include private and sensitive information about the subjects. One way to enable effective data mining while preserving privacy is to anonymize the data set that includes private information about subjects before being released for data mining. One way to anonymize data set is
Kisilevich, Slava   +3 more
openaire   +2 more sources

θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records

open access: yesElectronics, 2020
The Internet of Things (IoT) is an exponentially growing emerging technology, which is implemented in the digitization of Electronic Health Records (EHR).
Razaullah Khan   +7 more
semanticscholar   +1 more source

Trajectory Clustering and k-NN for Robust Privacy Preserving k-NN Query Processing in GeoSpark

open access: yesAlgorithms, 2020
Privacy Preserving and Anonymity have gained significant concern from the big data perspective. We have the view that the forthcoming frameworks and theories will establish several solutions for privacy protection.
Elias Dritsas   +5 more
doaj   +1 more source

MULTIPLE RELEASES OF k-ANONYMOUS DATA SETS AND k-ANONYMOUS RELATIONAL DATABASES

open access: yesInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012
In data privacy, the evaluation of the disclosure risk has to take into account the fact that several releases of the same or similar information about a population are common. In this paper we discuss this issue within the scope of k-anonymity. We also show how this issue is related to the publication of privacy protected databases that consist of ...
Stokes, Klara, Torra, Vicenç
openaire   +4 more sources

DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity

open access: yesIEEE Access, 2020
With the gradually opening of energy markets and popularization of Electric Vehicles (EVs), EVs can transmit, dispatch and recharge energy in different markets and domains dynamically.
Yangyang Long   +4 more
semanticscholar   +1 more source

A Differentially Private (Random) Decision Tree without Noise from k-Anonymity

open access: yesApplied Sciences
This paper focuses on the relationship between decision trees, a typical machine learning method, and data anonymization. It is known that information leaked from trained decision trees can be evaluated using well-studied data anonymization techniques ...
Atsushi Waseda, Ryo Nojima, Lihua Wang
doaj   +1 more source

k-Anonymity Location Privacy Algorithm Based on Clustering

open access: yesIEEE Access, 2018
The accuracy of user location information is inversely proportional to the user's privacy preserving degree k, and is proportional to quality of query service.
Lijuan Zheng   +5 more
doaj   +1 more source

A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities

open access: yesSensors, 2023
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing.
Hua Shen, Yu Wang, Mingwu Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy