We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Algorithmic Protection Study Based on a Virtual Location

    With the development of big data technology and wireless communication technology, Internet-of-Vehicles (IOV) has been widely used. In order to...
    Zehui Wen, Yiqun Zhu in 6GN for Future Wireless Networks
    Conference paper 2024
  2. Analysis and Protection of Public Medical Dataset: From Privacy Perspective

    High-quality medical treatment is unattainable without protecting patients’ medical records and other sensitive information. One of the most critical...
    Samsad Jahan, Yong-Feng Ge, ... Hua Wang in Health Information Science
    Conference paper 2023
  3. Privacy for Data: Masking Methods

    This chapter describes major methods for protecting databases. This includes perturbative and non-perturbative methods, as well as synthetic data...
    Vicenç Torra in Guide to Data Privacy
    Chapter 2022
  4. A systematic overview on methods to protect sensitive data provided for various analyses

    In view of the various methodological developments regarding the protection of sensitive data, especially with respect to privacy-preserving...

    Matthias Templ, Murat Sariyar in International Journal of Information Security
    Article Open access 18 August 2022
  5. Disclosure, Privacy Models, and Privacy Mechanisms

    This chapter describes the different types of disclosure that can take place in data and data-driven model releases. They are, mainly, of two types:...
    Vicenç Torra in Guide to Data Privacy
    Chapter 2022
  6. Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing

    With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices, trajectory...

    She Sun, Shuai Ma, ... Tiejun Ma in Journal of Computer Science and Technology
    Article 30 September 2022
  7. Post-quantum secure recipient revocable broadcast encryption supporting anonymity

    Recipient revocable broadcast encryption (RRevocBE), introduced by Susilo et al. is a cryptographic primitive which allows public revocation of users...

    Amit Kumar Singh, Kamalesh Acharya, Sourav Mukhopadhyay in Multimedia Tools and Applications
    Article 25 May 2023
  8. A Privacy-Preserving Walk in the Latent Space of Generative Models for Medical Applications

    Generative Adversarial Networks (GANs) have demonstrated their ability to generate synthetic samples that match a target distribution. However, from...
    Matteo Pennisi, Federica Proietto Salanitri, ... Concetto Spampinato in Medical Image Computing and Computer Assisted Intervention – MICCAI 2023
    Conference paper 2023
  9. k-Degree anonymity on directed networks

    In this paper, we consider the problem of anonymization on directed networks. Although there are several anonymization methods for networks, most of...

    Jordi Casas-Roma, Julián Salas, ... Michalis Vazirgiannis in Knowledge and Information Systems
    Article 01 September 2018
  10. A hybrid model for data security and preserving anonymity using machine learning

    Recent technological advancements have increased the usage of cloud services in all sectors of the business model. The data populated in cloud...

    Shridhar Allagi, Rashmi Rachh, Basavaraj Anami in International Journal of Information Technology
    Article 31 August 2021
  11. Federated Clouds: A New Metric for Measuring the Quality of Data Anonymization

    Federated cloud has emerged as solution for cloud service providers to get scalability in serving the growing demand for cloud resources. In a...
    Youssoupha Gaye, Maissa Mbaye, ... Joke A. Badejo in Ubiquitous Networking
    Conference paper 2024
  12. Studying L-Diversity and K-Anonymity Over Datasets with Sensitive Fields

    Data mining has been popular for its possibilities and what it has to offer. There is a need to consider the privacy of the people which data will be...
    Franck Seigneur Nininahazwe in Artificial Intelligence and Security
    Conference paper 2019
  13. Sensitive Data Recognition and Filtering Model of Webpage Content Based on Decision Tree Algorithm

    In recent years, privacy-protecting data mining has attracted widespread concern because it is necessary to provide protection for the privacy level...
    Sheng Ye, Yong Cheng, ... Qian Guo in Big Data and Security
    Conference paper 2021
  14. Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation Algorithm

    With the arrival of the information age, privacy leaks have been getting increasingly serious. The commonly-used method for privacy protection is to...
    Yongliang Jia, Peng Tao, ... Bing Li in Big Data and Security
    Conference paper 2021
  15. Towards Integrally Private Clustering: Overlap** Clusters for High Privacy Guarantees

    Privacy for re-identification, k-anonymity, and differential privacy are the main privacy models considered in the literature on data privacy. We...
    Conference paper 2022
  16. k-SALSA: k-Anonymous Synthetic Averaging of Retinal Images via Local Style Alignment

    The application of modern machine learning to retinal image analyses offers valuable insights into a broad range of human health conditions beyond...
    Minkyu Jeon, Hyeon** Park, ... Hyunghoon Cho in Computer Vision – ECCV 2022
    Conference paper 2022
  17. An Efficient Approach for Spatial Trajectory Anonymization

    Spatial trajectories are being extensively collected and utilized nowadays. When publishing trajectory datasets that contain identifiable information...
    Yuetian Wang, Wen Hua, ... **aofang Zhou in Web Information Systems Engineering – WISE 2021
    Conference paper 2021
  18. Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity

    At present, there are many threats to medical data security. Because of the different standards of data storage and system, it is very difficult to...
    Hui Sun, Cheng Huang, ... Fulong Chen in Cyberspace Safety and Security
    Conference paper 2019
  19. E-voting scheme using secret sharing and K-anonymity

    E-voting maybe replaces the traditional voting scheme in the future, however, the security threat must be paid enough attention. In this paper, a...

    Yining Liu, Quanyu Zhao in World Wide Web
    Article 25 April 2018
  20. Bistochastic Privacy

    We introduce a new privacy model relying on bistochastic matrices, that is, matrices whose components are nonnegative and sum to 1 both row-wise and...
    Nicolas Ruiz, Josep Domingo-Ferrer in Modeling Decisions for Artificial Intelligence
    Conference paper 2022
Did you find what you were looking for? Share feedback.