We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,481 results
  1. Towards graph-anonymization of software analytics data: empirical study on JIT defect prediction

    As the usage of software analytics for understanding different organizational practices becomes prevalent, it is important that data for these...

    Akshat Malik, Bram Adams, Ahmed Hassan in Empirical Software Engineering
    Article 01 June 2024
  2. Semantic-aware deidentification generative adversarial networks for identity anonymization

    Privacy protection in the computer vision field has attracted increasing attention. Generative adversarial network-based methods have been explored...

    Hyeongbok Kim, Zhiqi Pang, ... ** Suk Lee in Multimedia Tools and Applications
    Article Open access 07 October 2022
  3. A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment

    Privacy and security are the most essential barriers preventing widespread public cloud adaptation. The data that is distributed within the cloud...

    S. Nikkath Bushra, Nalini Subramanian, ... S. Radhika in The Journal of Supercomputing
    Article 16 October 2023
  4. Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing

    With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices, trajectory...

    She Sun, Shuai Ma, ... Tiejun Ma in Journal of Computer Science and Technology
    Article 30 September 2022
  5. HAkAu: hybrid algorithm for effective k-automorphism anonymization of social networks

    Online social network datasets contain a large amount of various information about their users. Preserving users’ privacy while publishing or sharing...

    Jana Medková, Josef Hynek in Social Network Analysis and Mining
    Article Open access 04 April 2023
  6. Manhattan-based k-member clustering and enhanced rabbit optimization algorithm for k-anonymization in social network

    Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their...

    K. Sivasankari, K. M. Uma Maheswari in Multimedia Tools and Applications
    Article 19 April 2024
  7. Protecting the privacy of social network data using graph correction

    Today, the rapid development of online social networks, as well as low costs, easy communication, and quick access with minimal facilities have made...

    Amir Dehaki Toroghi, Javad Hamidzadeh in Knowledge and Information Systems
    Article 17 April 2024
  8. Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments

    Everyday usage of online Internet services and the recent rise of the Internet of Things (IoT) cause the collection of a massive amount of data,...
    Conference paper 2023
  9. Model-Agnostic Utility-Preserving Biometric Information Anonymization

    The recent rapid advancements in both sensing and machine learning technologies have given rise to the universal collection and utilization of...

    Chun-Fu Chen, Bill Moriarty, ... Pierangela Samarati in International Journal of Information Security
    Article 23 May 2024
  10. Path-Preserving Anonymization for Inter-domain Routing Policies

    The Internet consists of tens of thousands of autonomous systems (ASes), which exchange routing information through policy-based routing protocols,...
    **aozhe Shao, Hossein Pishro-Nik, Lixin Gao in Risks and Security of Internet and Systems
    Conference paper 2022
  11. Utility-Preserving Biometric Information Anonymization

    The use of biometrics such as fingerprints, voices, and images are becoming increasingly more ubiquitous through people’s daily lives, in...
    Bill Moriarty, Chun-Fu (Richard) Chen, ... Pierangela Samarati in Computer Security – ESORICS 2022
    Conference paper 2022
  12. Community-Preserving Social Graph Release with Node Differential Privacy

    The goal of privacy-preserving social graph release is to protect individual privacy while preserving data utility. Community structure, which is an...

    Sen Zhang, Wei-Wei Ni, Nan Fu in Journal of Computer Science and Technology
    Article 30 November 2023
  13. Globally Consistent Vertical Federated Graph Autoencoder for Privacy-Preserving Community Detection

    Community detection is a trendy area in research on complex network analysis and has a wide range of real-world applications, like advertising. As...
    Yutong Fang, Qingqing Huang, ... **aoqi Chen in Computer Supported Cooperative Work and Social Computing
    Conference paper 2023
  14. Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum with Graph Traversal Technology

    Detecting Ponzi schemes in blockchain is an urgent task due to the various illegal transactions generated on the blockchain, among which Ponzi...
    Yuxi Zhang, Haifeng Guo, ... Jianfu Luo in Blockchain and Trustworthy Systems
    Conference paper 2024
  15. Graph neural networks: a survey on the links between privacy and security

    Graph neural networks (GNNs) are models that capture the dependencies between graph data by passing messages between graph nodes and they have been...

    Faqian Guan, Tianqing Zhu, ... Kim-Kwang Raymond Choo in Artificial Intelligence Review
    Article Open access 08 February 2024
  16. High-performance pseudo-anonymization of virtual power plant data on a CPU cluster

    The considerable move towards the use of renewable energy resources has been provided by the digitization of energy systems with the help of virtual...

    Mahdi Abbasi, Azam Fazel Najafabadi, ... Habib Nasser in Cluster Computing
    Article Open access 15 January 2022
  17. DUEF-GA: data utility and privacy evaluation framework for graph anonymization

    Anonymization of graph-based data is a problem which has been widely studied over the last years, and several anonymization methods have been...

    Article 23 September 2019
  18. Heterogeneous graph neural network with semantic-aware differential privacy guarantees

    Most social networks can be modeled as heterogeneous graphs. Recently, advanced graph learning methods exploit the rich node properties and...

    Yuecen Wei, **ngcheng Fu, ... **anxian Li in Knowledge and Information Systems
    Article 15 May 2023
  19. Efficient approximation and privacy preservation algorithms for real time online evolving data streams

    Because of the processing of continuous unstructured large streams of data, mining real-time streaming data is a more challenging research issue than...

    Rahul A. Patil, Pramod D. Patil in World Wide Web
    Article 20 January 2024
  20. DYGL: A Unified Benchmark and Library for Dynamic Graph

    Difficulty in reproducing the code and inconsistent experimental methods hinder the development of the dynamic network field. We present DYGL, a...
    Teng Ma, Bin Shi, ... Bo Dong in Web and Big Data
    Conference paper 2024
Did you find what you were looking for? Share feedback.