Results 1 to 10 of about 688,707 (222)
Rainbow: reliable personally identifiable information retrieval across multi-cloud
Personally identifiable information (PII) refers to any information that links to an individual. Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.
Zishuai Song+4 more
doaj +4 more sources
Clinical epidemiology and patient-oriented health care research that incorporates neighborhood-level data is becoming increasingly common. A key step in conducting this research is converting patient address data to longitude and latitude data,
Andrew Graham Rundle+2 more
doaj +4 more sources
A Survey on Securing Personally Identifiable Information on Smartphones [PDF]
With an ever-increasing footprint, already topping three billion devices, smartphones have become a huge cybersecurity concern. The portability of smartphones makes them convenient for users to access and store personally identifiable information (PII); this also makes them a popular target for hackers.
Pope, Dar’rell+2 more
semanticscholar +6 more sources
Analyzing Leakage of Personally Identifiable Information in Language Models
Language Models (LMs) have been shown to leak information about training data through sentence-level membership inference and reconstruction attacks. Understanding the risk of LMs leaking Personally Identifiable Information (PII) has received less attention, which can be attributed to the false assumption that dataset curation techniques such as ...
Lukas, Nils+5 more
openaire +3 more sources
Recent findings have shown that the continued expansion of the scope and scale of data collected in electronic health records are making the protection of personally identifiable information (PII) more challenging and may inadvertently put our ...
Emily R. Pfaff+7 more
doaj +2 more sources
Honey password vaults tolerating leakage of both personally identifiable information and passwords
Honey vaults are useful tools for password management. A vault usually contains usernames for each domain, and the corresponding passwords, encrypted with a master password chosen by the owner.
Chao An+4 more
doaj +2 more sources
Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward
The current age is witnessing an unprecedented dependence on data originating from humans through the devices that comprise the Internet of Things. The data collected by these devices are used for many purposes, including predictive maintenance, smart ...
Imran Makhdoom+5 more
doaj +2 more sources
KDPII: A New Korean Dialogic Dataset for the Deidentification of Personally Identifiable Information
The rapid growth of social media in the era of big data and artificial intelligence has raised significant safety concerns related to the communication of sensitive personal information.
Li Fei+5 more
doaj +2 more sources
PIILO: an open-source system for personally identifiable information labeling and obfuscation
Purpose This study aims to report on an automatic deidentification system for labeling and obfuscating personally identifiable information (PII) in student-generated text. Design/methodology/approach The authors evaluate the performance of their deidentification system on two data sets of student-generated text. Each data set was human-annotated for
Holmes, Langdon+3 more
openaire +2 more sources
Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in
Abdul Majeed+2 more
doaj +2 more sources