Search
Search Results
-
Algorithmic Protection Study Based on a Virtual Location
With the development of big data technology and wireless communication technology, Internet-of-Vehicles (IOV) has been widely used. In order to... -
Analysis and Protection of Public Medical Dataset: From Privacy Perspective
High-quality medical treatment is unattainable without protecting patients’ medical records and other sensitive information. One of the most critical... -
Privacy for Data: Masking Methods
This chapter describes major methods for protecting databases. This includes perturbative and non-perturbative methods, as well as synthetic data... -
A systematic overview on methods to protect sensitive data provided for various analyses
In view of the various methodological developments regarding the protection of sensitive data, especially with respect to privacy-preserving...
-
Disclosure, Privacy Models, and Privacy Mechanisms
This chapter describes the different types of disclosure that can take place in data and data-driven model releases. They are, mainly, of two types:... -
Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing
With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices, trajectory...
-
Post-quantum secure recipient revocable broadcast encryption supporting anonymity
Recipient revocable broadcast encryption (RRevocBE), introduced by Susilo et al. is a cryptographic primitive which allows public revocation of users...
-
A Privacy-Preserving Walk in the Latent Space of Generative Models for Medical Applications
Generative Adversarial Networks (GANs) have demonstrated their ability to generate synthetic samples that match a target distribution. However, from... -
k-Degree anonymity on directed networks
In this paper, we consider the problem of anonymization on directed networks. Although there are several anonymization methods for networks, most of...
-
A hybrid model for data security and preserving anonymity using machine learning
Recent technological advancements have increased the usage of cloud services in all sectors of the business model. The data populated in cloud...
-
Federated Clouds: A New Metric for Measuring the Quality of Data Anonymization
Federated cloud has emerged as solution for cloud service providers to get scalability in serving the growing demand for cloud resources. In a... -
Studying L-Diversity and K-Anonymity Over Datasets with Sensitive Fields
Data mining has been popular for its possibilities and what it has to offer. There is a need to consider the privacy of the people which data will be... -
Sensitive Data Recognition and Filtering Model of Webpage Content Based on Decision Tree Algorithm
In recent years, privacy-protecting data mining has attracted widespread concern because it is necessary to provide protection for the privacy level... -
Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation Algorithm
With the arrival of the information age, privacy leaks have been getting increasingly serious. The commonly-used method for privacy protection is to... -
Towards Integrally Private Clustering: Overlap** Clusters for High Privacy Guarantees
Privacy for re-identification, k-anonymity, and differential privacy are the main privacy models considered in the literature on data privacy. We... -
k-SALSA: k-Anonymous Synthetic Averaging of Retinal Images via Local Style Alignment
The application of modern machine learning to retinal image analyses offers valuable insights into a broad range of human health conditions beyond... -
An Efficient Approach for Spatial Trajectory Anonymization
Spatial trajectories are being extensively collected and utilized nowadays. When publishing trajectory datasets that contain identifiable information... -
Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity
At present, there are many threats to medical data security. Because of the different standards of data storage and system, it is very difficult to... -
E-voting scheme using secret sharing and K-anonymity
E-voting maybe replaces the traditional voting scheme in the future, however, the security threat must be paid enough attention. In this paper, a...
-
Bistochastic Privacy
We introduce a new privacy model relying on bistochastic matrices, that is, matrices whose components are nonnegative and sum to 1 both row-wise and...