We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Mastering data privacy: leveraging K-anonymity for robust health data sharing

    In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical...

    Stylianos Karagiannis, Christoforos Ntantogian, ... Luís Landeiro Ribeiro in International Journal of Information Security
    Article Open access 26 March 2024
  2. Attribute disclosure risk for k-anonymity: the case of numerical data

    k -Anonymity is one of the most well-known privacy models. Internal and external attacks were discussed for this privacy model, both focusing on...

    Vicenç Torra, Guillermo Navarro-Arribas in International Journal of Information Security
    Article Open access 25 July 2023
  3. MLDA: a multi-level k-degree anonymity scheme on directed social network graphs

    With the emergence of network-centric data, social network graph publishing is conducive to data analysts to mine the value of social networks,...

    Yuan**g Hao, Long Li, ... Tianlong Gu in Frontiers of Computer Science
    Article 04 December 2023
  4. Face Image Privacy Protection with Differential Private k-Anonymity

    In this section, we present a novel face image privacy protection method with differential private k-anonymity, which can not only generate...
    Chapter 2024
  5. Blockchain-Based Multi-factor K-Anonymity Group Location Privacy Protection Scheme

    Nowadays, location privacy issues have become an important problem faced by users of location-based services (LBS). For a long time, most researchers...
    Haotian Wang, Shang Wang, ... Meiju Yu in Computer Supported Cooperative Work and Social Computing
    Conference paper 2024
  6. Flexible k-anonymity Scheme Suitable for Different Scenarios in Social Networks

    Social networks not only help expand interpersonal interactions, enable data analysis, and implement intelligent recommendations, but also can deeply...
    Mingmeng Zhang, Yuan**g Hao, ... Long Li in Intelligent Information Processing XII
    Conference paper 2024
  7. A trusted de-swinging k-anonymity scheme for location privacy protection

    K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are...

    Manxiang Yang, Baopeng Ye, ... **aomei Yu in Journal of Cloud Computing
    Article Open access 08 January 2022
  8. A k-Anonymity-Based Robust Watermarking Scheme for Relational Database

    In the era of big data, secure and controlled data publishing becomes increasingly vital. When data holders publish dataset to data demanders, data...
    **g Yu, Shuguang Yuan, ... Chi Chen in Science of Cyber Security
    Conference paper 2022
  9. K-Anonymity Versus PSI3 for Depersonalization and Security Assessment of Large Data Structures

    The article presents a modern approach to protecting personal data from de-anonymization. Descriptions of the k-anonymity model using entropy, with...
    Alexander Bogdanov, Nadezhda Shchegoleva, ... Aleksandr Dik in Computational Science and Its Applications – ICCSA 2023 Workshops
    Conference paper 2023
  10. Data privacy preservation algorithm with k-anonymity

    With growing concern of data privacy violations, privacy preservation processes become more intense. The k -anonymity method, a widely applied...

    Waranya Mahanan, W. Art Chaovalitwongse, Juggapong Natwichai in World Wide Web
    Article Open access 28 July 2021
  11. K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing

    Efficient privacy-preserving algorithms are used in internet of things (IoT) applications, virtualization and edge computing environments to decrease...

    Chen Ling, Weizhe Zhang, Hui He in Cluster Computing
    Article 05 October 2022
  12. k-Anonymity

    Sabrina De Capitani di Vimercati, Pierangela Samarati in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2021
  13. (\(k,\varepsilon ,\delta \))-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy

    The General Data Protection Regulation came into effect on May 25, 2018, and has rapidly become a touchstone model for modern privacy law. It...

    Yao-Tung Tsou, Mansour Naser Alraja, ... Pei-Yuan Tsai in Service Oriented Computing and Applications
    Article 06 August 2021
  14. A graph modification approach for k-anonymity in social networks using the genetic algorithm

    Social networks, which have become so popular today, allow their users to share information. The main challenge the users are facing is the security...

    Sara Rajabzadeh, Pedram Shahsafi, Mostafa Khoramnejadi in Social Network Analysis and Mining
    Article 03 June 2020
  15. Data anonymization: a novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoT

    Advancement in the Internet of Things (IoT) technologies makes life more convenient for people. Data sensed from the devices can be used for...

    Waranya Mahanan, W. Art Chaovalitwongse, Juggapong Natwichai in Service Oriented Computing and Applications
    Article 27 February 2020
  16. Lifting in Support of Privacy-Preserving Probabilistic Inference

    Privacy-preserving inference aims to avoid revealing identifying information about individuals during inference. Lifted probabilistic inference works...

    Marcel Gehrke, Johannes Liebenow, ... Tanya Braun in KI - Künstliche Intelligenz
    Article Open access 13 June 2024
  17. Manhattan-based k-member clustering and enhanced rabbit optimization algorithm for k-anonymization in social network

    Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their...

    K. Sivasankari, K. M. Uma Maheswari in Multimedia Tools and Applications
    Article 19 April 2024
  18. Model Extraction Oriented Data Publishing with k-anonymity

    Machine learning with personal data has been successfully employed in recent years. Protecting the privacy of a given personal dataset with utilities...
    Takeru Fukuoka, Yuji Yamaoka, Takeaki Terada in Advances in Information and Computer Security
    Conference paper 2020
  19. Privacy preserving using joint 2 K-means clustering and coati optimization algorithm for online social networks

    Social networks, that have grown so prevalent nowadays, enable users to exchange information and save a significant amount of personal data about...

    Nithish Ranjan Gowda, Venkatesh, K. R. Venugopal in International Journal of Information Technology
    Article 14 February 2024
  20. An Analysis of Different Notions of Effectiveness in k-Anonymity

    k-anonymity is an approach for enabling privacy-preserving data publishing of personal, sensitive data. As a result of this anonymisation process,...
    Tanja Šarčević, David Molnar, Rudolf Mayer in Privacy in Statistical Databases
    Conference paper 2020
Did you find what you were looking for? Share feedback.