We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. A weighted K-member clustering algorithm for K-anonymization

    As a representative model for privacy preserving data publishing, K-anonymity has raised a considerable number of questions for researchers over the...

    Yan Yan, Eyeleko Anselme Herman, ... Pengshou **e in Computing
    Article 20 February 2021
  2. Distributed L-diversity using spark-based algorithm for large resource description frameworks data

    Privacy protection issues for resource description frameworks (RDFs) have emerged over the use of public government open data and the healthcare data...

    MinHyuk Jeon, Odsuren Temuu**, ... Dong-Hyuk Im in The Journal of Supercomputing
    Article 04 January 2021
  3. Graph Matching Based Privacy-Preserving Scheme in Social Networks

    The increasing popularity of social networks has inspired recent research to explore social graphs for data mining. Because social graph data...
    Hongyan Zhang, **aolin Li, ... Li Xu in Security and Privacy in Social Networks and Big Data
    Conference paper 2021
  4. Video in 10 Bits: Few-Bit VideoQA for Efficiency and Privacy

    In Video Question Answering (VideoQA), answering general questions about a video requires its visual information. Yet, video often contains redundant...
    Shiyuan Huang, Robinson Piramuthu, ... Gunnar A. Sigurdsson in Computer Vision – ECCV 2022 Workshops
    Conference paper 2023
  5. Path-Preserving Anonymization for Inter-domain Routing Policies

    The Internet consists of tens of thousands of autonomous systems (ASes), which exchange routing information through policy-based routing protocols,...
    **aozhe Shao, Hossein Pishro-Nik, Lixin Gao in Risks and Security of Internet and Systems
    Conference paper 2022
  6. Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments

    Nowadays Vehicle-to-Vehicle communication (V2V) plays an increasingly important role, not only in terms of safety, but also in other areas of...
    Mirja Nitschke, Christian Roth, ... Doğan Kesdoğan in Information Systems Security and Privacy
    Conference paper 2022
  7. Limiting Disclosure by Hiding the Identity

    This chapter begins the examination of techniques that are designed to limit disclosure (rather than exposure). In particular, it focuses on...
    Chapter 2021
  8. Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups

    We introduce a combination of Shamir’s secret sharing and dining-cryptographers networks, which provides...
    David Mödinger, Juri Dispan, Franz J. Hauck in Distributed Applications and Interoperable Systems
    Conference paper 2021
  9. An Optimization-Based Decomposition Heuristic for the Microaggregation Problem

    Given a set of points, the microaggregation problem aims to find a clustering with a minimum sum of squared errors (SSE), where the cardinality of...
    Jordi Castro, Claudio Gentile, Enric Spagnolo-Arrizabalaga in Privacy in Statistical Databases
    Conference paper 2022
  10. Hybrid Data Privacy and Anonymization Algorithms for Smart Health Applications

    In line with the concept of Smart cities and Smart World, there have been bewildering developments in the field of Internet of Things (IoT) and Big...

    Y. N. Fakeeroodeen, Y. Beeharry in SN Computer Science
    Article 04 March 2021
  11. Guide to Data Privacy Models, Technologies, Solutions

    Data privacy technologies are essential for implementing information systems with privacy by design.

    Privacy technologies clearly are needed for...

    Textbook 2022
  12. Privacy preserving data sharing and analysis for edge-based architectures

    In this paper, we present a framework for privacy preserving collaborative data analysis among multiple data providers acting as edge of a cloud...

    Mina Sheikhalishahi, Andrea Saracino, ... Antonio La Marra in International Journal of Information Security
    Article 06 March 2021
  13. Anonymizing Machine Learning Models

    There is a known tension between the need to analyze personal data to drive business and the need to preserve the privacy of data subjects. Many data...
    Abigail Goldsteen, Gilad Ezov, ... Ariel Farkash in Data Privacy Management, Cryptocurrencies and Blockchain Technology
    Conference paper 2022
  14. Security- and Privacy-Aware IoT Application Placement and User Assignment

    Applications for the Internet of Things (IoT) may use, beyond the IoT devices themselves, also edge and cloud resources. Thus, the modules of an...
    Conference paper 2022
  15. Preliminaries

    This chapter provides a fundamental understanding regarding privacy-preserving technologies, followed by deep learning. We introduce the classical...
    Kwangjo Kim, Harry Chandra Tanuwidjaja in Privacy-Preserving Deep Learning
    Chapter 2021
  16. Protecting query privacy with differentially private k-anonymity in location-based services

    Nowadays, location-based services (LBS) are facilitating people in daily life through answering LBS queries. However, privacy issues including location ...

    **bao Wang, Zhipeng Cai, ... Hong Gao in Personal and Ubiquitous Computing
    Article 09 March 2018
  17. Remodeling: improved privacy preserving data mining (PPDM)

    The data provided by individuals and various organizations while using internet applications and mobile devices are very useful to generate solutions...

    Meghna D. Shastri, Anala A. Pandit in International Journal of Information Technology
    Article 20 October 2020
  18. Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets

    The problem of protecting datasets from the disclosure of confidential information, while published data remains useful for analysis, has recently...
    Mina Alishahi, Nicola Zannone in Data and Applications Security and Privacy XXXV
    Conference paper 2021
  19. k-Anonymity

    Josep Domingo-Ferrer in Encyclopedia of Database Systems
    Reference work entry 2018
  20. K-Anonymity Algorithm Based on Improved Clustering

    K-anonymity is the most widely used technology in the field of privacy preservation. It has a good performance particularly in protecting data...
    Wantong Zheng, Zhongyue Wang, ... Chunfu Jia in Algorithms and Architectures for Parallel Processing
    Conference paper 2018
Did you find what you were looking for? Share feedback.