Results 61 to 70 of about 52,169 (277)

Trajectory Clustering and k-NN for Robust Privacy Preserving k-NN Query Processing in GeoSpark

open access: yesAlgorithms, 2020
Privacy Preserving and Anonymity have gained significant concern from the big data perspective. We have the view that the forthcoming frameworks and theories will establish several solutions for privacy protection.
Elias Dritsas   +5 more
doaj   +1 more source

MULTIPLE RELEASES OF k-ANONYMOUS DATA SETS AND k-ANONYMOUS RELATIONAL DATABASES

open access: yesInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012
In data privacy, the evaluation of the disclosure risk has to take into account the fact that several releases of the same or similar information about a population are common. In this paper we discuss this issue within the scope of k-anonymity. We also show how this issue is related to the publication of privacy protected databases that consist of ...
Stokes, Klara, Torra, Vicenç
openaire   +4 more sources

The Role of Quasi-identifiers in k-Anonymity Revisited [PDF]

open access: yes, 2006
The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short).
Bettini, Claudio   +2 more
core   +1 more source

A Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
Block Diagram of the Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller. ABSTRACT This article introduces a discrete‐time robust adaptive one‐sample‐ahead preview super‐twisting sliding mode controller. A stability analysis of the controller by Lyapunov criteria is developed to demonstrate its robustness in handling both ...
Guilherme Vieira Hollweg   +5 more
wiley   +1 more source

Dual‐Layer Living Hydrogel Enables On‐Demand Delivery of Phages and Probiotics for Synergistic Wound Infection Therapy

open access: yesAdvanced Functional Materials, EarlyView.
A dual‐layer living hydrogel, ProΦGel, integrates bacteriophages and probiotics for synergistic wound infection therapy. The outer gelatin‐based matrix releases phages on demand in response to P. aeruginosa infections, while inner alginate beads sustain probiotic delivery.
Siyuan Tao   +6 more
wiley   +1 more source

The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?

open access: yesAdvanced Robotics Research, EarlyView.
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley   +1 more source

A Differentially Private (Random) Decision Tree without Noise from k-Anonymity

open access: yesApplied Sciences
This paper focuses on the relationship between decision trees, a typical machine learning method, and data anonymization. It is known that information leaked from trained decision trees can be evaluated using well-studied data anonymization techniques ...
Atsushi Waseda, Ryo Nojima, Lihua Wang
doaj   +1 more source

k-Anonymity Location Privacy Algorithm Based on Clustering

open access: yesIEEE Access, 2018
The accuracy of user location information is inversely proportional to the user's privacy preserving degree k, and is proportional to quality of query service.
Lijuan Zheng   +5 more
doaj   +1 more source

A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities

open access: yesSensors, 2023
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing.
Hua Shen, Yu Wang, Mingwu Zhang
doaj   +1 more source

Generalization-Based k-Anonymization [PDF]

open access: yes, 2015
Peer ...
Armengol, Eva, Torra, Vicenç
openaire   +2 more sources

Home - About - Disclaimer - Privacy