Search
Search Results
-
Mastering data privacy: leveraging K-anonymity for robust health data sharing
In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical...
-
Attribute disclosure risk for k-anonymity: the case of numerical data
k -Anonymity is one of the most well-known privacy models. Internal and external attacks were discussed for this privacy model, both focusing on...
-
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs
With the emergence of network-centric data, social network graph publishing is conducive to data analysts to mine the value of social networks,...
-
Blockchain-Based Multi-factor K-Anonymity Group Location Privacy Protection Scheme
Nowadays, location privacy issues have become an important problem faced by users of location-based services (LBS). For a long time, most researchers... -
Face Image Privacy Protection with Differential Private k-Anonymity
In this section, we present a novel face image privacy protection method with differential private k-anonymity, which can not only generate... -
Flexible k-anonymity Scheme Suitable for Different Scenarios in Social Networks
Social networks not only help expand interpersonal interactions, enable data analysis, and implement intelligent recommendations, but also can deeply... -
A trusted de-swinging k-anonymity scheme for location privacy protection
K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are...
-
A k-Anonymity-Based Robust Watermarking Scheme for Relational Database
In the era of big data, secure and controlled data publishing becomes increasingly vital. When data holders publish dataset to data demanders, data... -
K-Anonymity Versus PSI3 for Depersonalization and Security Assessment of Large Data Structures
The article presents a modern approach to protecting personal data from de-anonymization. Descriptions of the k-anonymity model using entropy, with... -
Data privacy preservation algorithm with k-anonymity
With growing concern of data privacy violations, privacy preservation processes become more intense. The k -anonymity method, a widely applied...
-
K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing
Efficient privacy-preserving algorithms are used in internet of things (IoT) applications, virtualization and edge computing environments to decrease...
-
-
(\(k,\varepsilon ,\delta \))-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
The General Data Protection Regulation came into effect on May 25, 2018, and has rapidly become a touchstone model for modern privacy law. It...
-
A graph modification approach for k-anonymity in social networks using the genetic algorithm
Social networks, which have become so popular today, allow their users to share information. The main challenge the users are facing is the security...
-
Data anonymization: a novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoT
Advancement in the Internet of Things (IoT) technologies makes life more convenient for people. Data sensed from the devices can be used for...
-
Lifting in Support of Privacy-Preserving Probabilistic Inference
Privacy-preserving inference aims to avoid revealing identifying information about individuals during inference. Lifted probabilistic inference works...
-
Manhattan-based k-member clustering and enhanced rabbit optimization algorithm for k-anonymization in social network
Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their...
-
Model Extraction Oriented Data Publishing with k-anonymity
Machine learning with personal data has been successfully employed in recent years. Protecting the privacy of a given personal dataset with utilities... -
Privacy preserving using joint 2 K-means clustering and coati optimization algorithm for online social networks
Social networks, that have grown so prevalent nowadays, enable users to exchange information and save a significant amount of personal data about...
-
An Analysis of Different Notions of Effectiveness in k-Anonymity
k-anonymity is an approach for enabling privacy-preserving data publishing of personal, sensitive data. As a result of this anonymisation process,...