Reidentification Risk in Panel Data: Protecting for k-Anonymity
… To protect the privacy of panelists, we consider the well-known privacy notion of k-anonymity
and develop a new approach called graph-based minimum movement k-anonymization (k-…
and develop a new approach called graph-based minimum movement k-anonymization (k-…
[HTML][HTML] K-anonymity privacy protection algorithm for multi-dimensional data against skewness and similarity attacks
B Su, J Huang, K Miao, Z Wang, X Zhang, Y Chen�- Sensors, 2023 - mdpi.com
… of multi-dimensional data, we propose a multi-dimensional data K-anonymity privacy protection
algorithm (KAPP) against skewness and similarity attacks. Firstly, we preprocess the multi…
algorithm (KAPP) against skewness and similarity attacks. Firstly, we preprocess the multi…
[HTML][HTML] Mastering data privacy: leveraging K-anonymity for robust health data sharing
S Karagiannis, C Ntantogian, E Magkos…�- International Journal of�…, 2024 - Springer
… privacy preservation algorithm, which is k-anonymity. The reason behind our choice is that
k-anonymity … frameworks such as differential privacy, k-anonymity remains popular as shown …
k-anonymity … frameworks such as differential privacy, k-anonymity remains popular as shown …
Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions
J Qian, H Jiang, Y Yu, H Wang, D Miao�- Expert Systems with Applications, 2024 - Elsevier
… To this end, we introduce sequential three-way decisions into k-anonymity, using a dynamic
… k-anonymity. Specifically, we first construct a hierarchical decision table for k-anonymity by …
… k-anonymity. Specifically, we first construct a hierarchical decision table for k-anonymity by …
[PDF][PDF] k-Anonymity: From Theory to Applications.
SDC di Vimercati, S Foresti, G Livraga…�- Trans. Data Priv., 2023 - spdp.di.unimi.it
… the privacy models and requirements of k-anonymity and of … and main privacy requirements
pursued by k-anonymity and … In Section 3, we focus on the enforcement of these privacy …
pursued by k-anonymity and … In Section 3, we focus on the enforcement of these privacy …
Privacy-aware and ai techniques for healthcare based on k-anonymity model in internet of things
AK Sangaiah, A Javadpour, F Ja'fari…�- IEEE Transactions�…, 2023 - ieeexplore.ieee.org
… , we examine the k-anonymity method in data protection. This algorithm initially … using
the definition of distance between the c of the records given. Algorithm 1 introduces k-anonymity…
the definition of distance between the c of the records given. Algorithm 1 introduces k-anonymity…
k‐anonymity based location privacy protection method for location‐based services in Internet of Thing
B Wang, Y Guo, H Li, Z Li�- Concurrency and Computation�…, 2023 - Wiley Online Library
… Targeting at the aforesaid concerns, we propose a k-anonymity location privacy protection
method based on Voronoi diagram in this study. The main contributions of this article as …
method based on Voronoi diagram in this study. The main contributions of this article as …
From Theory to Comprehension: A Comparative Study of Differential Privacy and -Anonymity
SN von Voigt, L Mehner, F Tschorsch�- arXiv preprint arXiv:2404.04006, 2024 - arxiv.org
… their comprehension of privacy protection of 𝑘-anonymity as … of differential privacy protection
is enhanced by the privacy risk … intuition that privacy protection provided by 𝑘-anonymity is …
is enhanced by the privacy risk … intuition that privacy protection provided by 𝑘-anonymity is …
[HTML][HTML] Attribute disclosure risk for k-anonymity: the case of numerical data
V Torra, G Navarro-Arribas�- International Journal of Information Security, 2023 - Springer
… We consider that this type of disclosure is also relevant for k-anonymity when data is … attack
on k-anonymity for numerical data based on standard tabular data protection privacy models […
on k-anonymity for numerical data based on standard tabular data protection privacy models […
On the Complexity of Optimal k-Anonymity: A New Proof based on Graph Coloring
Y Canbay�- IEEE Access, 2024 - ieeexplore.ieee.org
… To the best of our knowledge, this article proved the NPHardness of k-anonymity using a
reduction from degreelimited graph 3-coloring for the first time. We also improved both alphabet …
reduction from degreelimited graph 3-coloring for the first time. We also improved both alphabet …
Related searches
- location privacy protection personalized k anonymity
- privacy protection algorithm
- data privacy protection
- location privacy protection method
- location privacy protection scheme
- location privacy protection road network environment
- privacy protection machine learning algorithms
- privacy protection social networks