Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2018 at "International Journal of Information Security"
DOI: 10.1007/s10207-018-0409-1
Abstract: In this paper, we tackle the problem of graph anonymization in the context of privacy-preserving social network mining. We present a greedy and non-deterministic algorithm to achieve k-anonymity on labeled and undirected networks. Our work…
read more here.
Keywords:
scalable non;
clustering based;
anonymization;
based anonymization ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2023 at "International Journal of General Systems"
DOI: 10.1080/03081079.2023.2173749
Abstract: Healthcare is a rapidly evolving field. Such development creates opportunities to provide better quality, evidence-based treatment, however, increasing privacy violations. Anonymization can be applied to share data safely. This paper is a literature review of…
read more here.
Keywords:
review methods;
literature review;
anonymization;
methods tools ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Briefings in Bioinformatics"
DOI: 10.1093/bib/bbac440
Abstract: Abstract Precision medicine relies on molecular and systems biology methods as well as bidirectional association studies of phenotypes and (high-throughput) genomic data. However, the integrated use of such data often faces obstacles, especially in regards…
read more here.
Keywords:
review open;
open tools;
phenotype data;
anonymization ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3175219
Abstract: With the continuous increase in avenues of personal data generation, privacy protection has become a hot research topic resulting in various proposed mechanisms to address this social issue. The main technical solutions for guaranteeing a…
read more here.
Keywords:
clustering based;
privacy;
anonymization;
privacy preservation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IT Professional"
DOI: 10.1109/mitp.2021.3132330
Abstract: Person-specific data owned by different data holders is usually anonymized before being shared with researchers or data-miners. Anonymization is a pertinent solution for releasing useful information while ensuring privacy. Many anonymization approaches have been proposed…
read more here.
Keywords:
imbalanced datasets;
anonymization;
anonymization approach;
practical anonymization ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2017.2697854
Abstract: Social network data is widely shared, transferred and published for research purposes and business interests, but it has raised much concern on users’ privacy. Even though users’ identity information is always removed, attackers can still…
read more here.
Keywords:
social network;
privacy inference;
privacy;
knowledge ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2017.2698472
Abstract: A number of studies on privacy-preserving data mining have been proposed. Most of them assume that they can separate quasi-identifiers (QIDs) from sensitive attributes. For instance, they assume that address, job, and age are QIDs…
read more here.
Keywords:
quasi identifiers;
diversity closeness;
anonymization;
sensitive attributes ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2017.2712150
Abstract: In this paper, we study the impacts of non-Personal Identifiable Information (non-PII) on the privacy of graph data with attribute information (e.g., social networks data with users’ profiles (attributes)), namely Structure-Attribute Graph (SAG) data, both…
read more here.
Keywords:
anonymization;
graph;
graph data;
structure attribute ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3208471
Abstract: Blockchain technology has the characteristics of decentralization, traceability and tamper-proof, which creates a reliable decentralized trust mechanism, further accelerating the development of blockchain finance. However, the anonymization of blockchain hinders market regulation, resulting in increasing…
read more here.
Keywords:
blockchain;
ethereum;
behavior;
graph ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Proceedings of the ACM on Human-Computer Interaction"
DOI: 10.1145/3274335
Abstract: Anonymization is viewed as a solution to over-exposure of personal information in a data-driven society. Yet how organizations apply anonymization techniques to data for regulatory, ethical or commercial reasons remains underexplored. We investigate how such…
read more here.
Keywords:
anonymization;
going beyond;
obscurity;
beyond obscurity ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Computational Linguistics"
DOI: 10.1162/coli_a_00458
Abstract: Abstract We present a novel benchmark and associated evaluation metrics for assessing the performance of text anonymization methods. Text anonymization, defined as the task of editing a text document to prevent the disclosure of personal…
read more here.
Keywords:
evaluation;
text anonymization;
anonymization;
anonymization benchmark ... See more keywords