Reidentification Risk in Panel Data: Protecting for k-Anonymity

S Li, MJ Schneider, Y Yu…�- Information Systems�…, 2023 - pubsonline.informs.org
… To protect the privacy of panelists, we consider the well-known privacy notion of k-anonymity
and develop a new approach called graph-based minimum movement k-anonymization (k-…

[HTML][HTML] K-anonymity privacy protection algorithm for multi-dimensional data against skewness and similarity attacks

B Su, J Huang, K Miao, Z Wang, X Zhang, Y Chen�- Sensors, 2023 - mdpi.com
… of multi-dimensional data, we propose a multi-dimensional data K-anonymity privacy protection
algorithm (KAPP) against skewness and similarity attacks. Firstly, we preprocess the multi…

[HTML][HTML] Mastering data privacy: leveraging K-anonymity for robust health data sharing

S Karagiannis, C Ntantogian, E Magkos…�- International Journal of�…, 2024 - Springer
privacy preservation algorithm, which is k-anonymity. The reason behind our choice is that
k-anonymity … frameworks such as differential privacy, k-anonymity remains popular as shown …

Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions

J Qian, H Jiang, Y Yu, H Wang, D Miao�- Expert Systems with Applications, 2024 - Elsevier
… To this end, we introduce sequential three-way decisions into k-anonymity, using a dynamic
k-anonymity. Specifically, we first construct a hierarchical decision table for k-anonymity by …

[PDF][PDF] k-Anonymity: From Theory to Applications.

SDC di Vimercati, S Foresti, G Livraga…�- Trans. Data Priv., 2023 - spdp.di.unimi.it
… the privacy models and requirements of k-anonymity and of … and main privacy requirements
pursued by k-anonymity and … In Section 3, we focus on the enforcement of these privacy

Privacy-aware and ai techniques for healthcare based on k-anonymity model in internet of things

AK Sangaiah, A Javadpour, F Ja'fari…�- IEEE Transactions�…, 2023 - ieeexplore.ieee.org
… , we examine the k-anonymity method in data protection. This algorithm initially … using
the definition of distance between the c of the records given. Algorithm 1 introduces k-anonymity

k‐anonymity based location privacy protection method for location‐based services in Internet of Thing

B Wang, Y Guo, H Li, Z Li�- Concurrency and Computation�…, 2023 - Wiley Online Library
… Targeting at the aforesaid concerns, we propose a k-anonymity location privacy protection
method based on Voronoi diagram in this study. The main contributions of this article as …

From Theory to Comprehension: A Comparative Study of Differential Privacy and -Anonymity

SN von Voigt, L Mehner, F Tschorsch�- arXiv preprint arXiv:2404.04006, 2024 - arxiv.org
… their comprehension of privacy protection of 𝑘-anonymity as … of differential privacy protection
is enhanced by the privacy risk … intuition that privacy protection provided by 𝑘-anonymity is …

[HTML][HTML] Attribute disclosure risk for k-anonymity: the case of numerical data

V Torra, G Navarro-Arribas�- International Journal of Information Security, 2023 - Springer
… We consider that this type of disclosure is also relevant for k-anonymity when data is … attack
on k-anonymity for numerical data based on standard tabular data protection privacy models […

On the Complexity of Optimal k-Anonymity: A New Proof based on Graph Coloring

Y Canbay�- IEEE Access, 2024 - ieeexplore.ieee.org
… To the best of our knowledge, this article proved the NPHardness of k-anonymity using a
reduction from degreelimited graph 3-coloring for the first time. We also improved both alphabet …