Results 61 to 70 of about 52,169 (277)
Trajectory Clustering and k-NN for Robust Privacy Preserving k-NN Query Processing in GeoSpark
Privacy Preserving and Anonymity have gained significant concern from the big data perspective. We have the view that the forthcoming frameworks and theories will establish several solutions for privacy protection.
Elias Dritsas +5 more
doaj +1 more source
MULTIPLE RELEASES OF k-ANONYMOUS DATA SETS AND k-ANONYMOUS RELATIONAL DATABASES
In data privacy, the evaluation of the disclosure risk has to take into account the fact that several releases of the same or similar information about a population are common. In this paper we discuss this issue within the scope of k-anonymity. We also show how this issue is related to the publication of privacy protected databases that consist of ...
Stokes, Klara, Torra, Vicenç
openaire +4 more sources
The Role of Quasi-identifiers in k-Anonymity Revisited [PDF]
The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short).
Bettini, Claudio +2 more
core +1 more source
A Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller
Block Diagram of the Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller. ABSTRACT This article introduces a discrete‐time robust adaptive one‐sample‐ahead preview super‐twisting sliding mode controller. A stability analysis of the controller by Lyapunov criteria is developed to demonstrate its robustness in handling both ...
Guilherme Vieira Hollweg +5 more
wiley +1 more source
A dual‐layer living hydrogel, ProΦGel, integrates bacteriophages and probiotics for synergistic wound infection therapy. The outer gelatin‐based matrix releases phages on demand in response to P. aeruginosa infections, while inner alginate beads sustain probiotic delivery.
Siyuan Tao +6 more
wiley +1 more source
The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley +1 more source
A Differentially Private (Random) Decision Tree without Noise from k-Anonymity
This paper focuses on the relationship between decision trees, a typical machine learning method, and data anonymization. It is known that information leaked from trained decision trees can be evaluated using well-studied data anonymization techniques ...
Atsushi Waseda, Ryo Nojima, Lihua Wang
doaj +1 more source
k-Anonymity Location Privacy Algorithm Based on Clustering
The accuracy of user location information is inversely proportional to the user's privacy preserving degree k, and is proportional to quality of query service.
Lijuan Zheng +5 more
doaj +1 more source
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing.
Hua Shen, Yu Wang, Mingwu Zhang
doaj +1 more source
Generalization-Based k-Anonymization [PDF]
Peer ...
Armengol, Eva, Torra, Vicenç
openaire +2 more sources

