Articles with "anonymization" as a keyword



Photo from archive.org

Scalable non-deterministic clustering-based k-anonymization for rich networks

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Information Security"

DOI: 10.1007/s10207-018-0409-1

Abstract: In this paper, we tackle the problem of graph anonymization in the context of privacy-preserving social network mining. We present a greedy and non-deterministic algorithm to achieve k-anonymity on labeled and undirected networks. Our work… read more here.

Keywords: scalable non; clustering based; anonymization; based anonymization ... See more keywords

Semi-local Time sensitive Anonymization of Clinical Data

Sign Up to like & get
recommendations!
Published in 2024 at "Scientific Data"

DOI: 10.1038/s41597-024-04192-1

Abstract: A method for the anonymization of time-continuous data, which preserves the relation between the time- and value dimension is proposed in this work. The approach protects against linking- and distribution attacks by providing k-anonymity and… read more here.

Keywords: time; anonymization; data semi; local time ... See more keywords

A textual dataset of de-identified health records in Spanish and Catalan for medical entity recognition and anonymization

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Data"

DOI: 10.1038/s41597-025-05320-1

Abstract: The advancement of clinical natural language processing systems is crucial to exploit the wealth of textual data contained in medical records. Diverse data sources are required in different languages and from different sites to represent… read more here.

Keywords: dataset identified; identified health; anonymization; health ... See more keywords

Methods and tools for healthcare data anonymization: a literature review

Sign Up to like & get
recommendations!
Published in 2023 at "International Journal of General Systems"

DOI: 10.1080/03081079.2023.2173749

Abstract: Healthcare is a rapidly evolving field. Such development creates opportunities to provide better quality, evidence-based treatment, however, increasing privacy violations. Anonymization can be applied to share data safely. This paper is a literature review of… read more here.

Keywords: review methods; literature review; anonymization; methods tools ... See more keywords

Open tools for quantitative anonymization of tabular phenotype data: literature review

Sign Up to like & get
recommendations!
Published in 2022 at "Briefings in Bioinformatics"

DOI: 10.1093/bib/bbac440

Abstract: Abstract Precision medicine relies on molecular and systems biology methods as well as bidirectional association studies of phenotypes and (high-throughput) genomic data. However, the integrated use of such data often faces obstacles, especially in regards… read more here.

Keywords: review open; open tools; phenotype data; anonymization ... See more keywords

Privacy-proof Live Surgery Streaming

Sign Up to like & get
recommendations!
Published in 2024 at "Annals of Surgery"

DOI: 10.1097/sla.0000000000006245

Abstract: Objective: Develop a pioneer surgical anonymization algorithm for reliable and accurate real-time removal of out-of-body images validated across various robotic platforms. Background The use of surgical video data has become a common practice in enhancing… read more here.

Keywords: anonymization; live surgery; surgery streaming; real time ... See more keywords

Towards Privacy Preservation using Clustering based Anonymization: Recent Advances and Future Research Outlook

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3175219

Abstract: With the continuous increase in avenues of personal data generation, privacy protection has become a hot research topic resulting in various proposed mechanisms to address this social issue. The main technical solutions for guaranteeing a… read more here.

Keywords: clustering based; privacy; anonymization; privacy preservation ... See more keywords

Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2024.3519441

Abstract: Data anonymization is an essential prerequisite that enables data sharing in a privacy-preserving manner. However, anonymization affects the quality of the data and thus might affect the performance of later conducted data analysis. In this… read more here.

Keywords: anonymization; anonymization methods; privacy; vision tasks ... See more keywords

A Practical Anonymization Approach for Imbalanced Datasets

Sign Up to like & get
recommendations!
Published in 2022 at "IT Professional"

DOI: 10.1109/mitp.2021.3132330

Abstract: Person-specific data owned by different data holders is usually anonymized before being shared with researchers or data-miners. Anonymization is a pertinent solution for releasing useful information while ensuring privacy. Many anonymization approaches have been proposed… read more here.

Keywords: imbalanced datasets; anonymization; anonymization approach; practical anonymization ... See more keywords

Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2017.2697854

Abstract: Social network data is widely shared, transferred and published for research purposes and business interests, but it has raised much concern on users’ privacy. Even though users’ identity information is always removed, attackers can still… read more here.

Keywords: social network; privacy inference; privacy; knowledge ... See more keywords

Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2017.2698472

Abstract: A number of studies on privacy-preserving data mining have been proposed. Most of them assume that they can separate quasi-identifiers (QIDs) from sensitive attributes. For instance, they assume that address, job, and age are QIDs… read more here.

Keywords: quasi identifiers; diversity closeness; anonymization; sensitive attributes ... See more keywords