Articles added in the last year, sorted by date
Privacy in manifolds: Combining k-anonymity with differential privacy on Fr�chet means
9 days ago - … (𝜖) in DP and k in k-anonymity on the manifold distance, … k-Anonymity and
Differential Privacy models for fixed distortions. Our findings demonstrate that anonymizing using …
Differential Privacy models for fixed distortions. Our findings demonstrate that anonymizing using …
Differentially Private Inductive Miner
M Schulze, Y Zisgen, M Kirschte, E Mohammadi…�- arXiv preprint arXiv�…, 2024 - arxiv.org
13 days ago - … areas that focus on privacy measures that do … privacy as DP or are parallel
to our work by protecting the mining process cryptographically. K-anonymity methods to protect …
to our work by protecting the mining process cryptographically. K-anonymity methods to protect …
A systematic comparison of measures for k-anonymity in networks
15 days ago - … is 𝑘-anonymity. This approach ultimately enables one to share an anonymized
version of the full network data while protecting … When using 𝑘-anonymity to this end, one …
version of the full network data while protecting … When using 𝑘-anonymity to this end, one …
BB-FLoC: A Blockchain-based Targeted Advertisement Scheme with K-Anonymity
34 days ago - … In the context of our model, we define satisfying the k-anonymity threshold as
simply having at least k number of active users within the same cohort; this idea of “hiding in …
simply having at least k number of active users within the same cohort; this idea of “hiding in …
Anonymizing Big Data Streams Using In-memory Processing: A Novel Model Based on One-time Clustering
E Shamsinejad, T Banirostam, MM Pedram…�- Journal of Signal�…, 2024 - Springer
54 days ago - … One of the common methods to protect data privacy is to … certain level of privacy
protection, such as k-anonymity, l-… for anonymizing big data using k-anonymity algorithms. …
protection, such as k-anonymity, l-… for anonymizing big data using k-anonymity algorithms. …
[PDF][PDF] Privacy in the Digital Age: Navigating the Risks and Benefits of Cybersecurity Measures
C Farnell, P Huff, W Cox�- Human Privacy in Virtual and Physical�…, 2024 - library.oapen.org
54 days ago - … Keeping data private can be accomplished through a procedure known as k-anonymity.
K-anonymity : The idea behind K-anonymity has been around since 1986 when …
K-anonymity : The idea behind K-anonymity has been around since 1986 when …
Score, Arrange and Cluster: A novel clustering-based technique for Privacy Preserving Data Publishing
CN Sowmyarani, LG Namya, GK Nidhi…�- IEEE Access, 2024 - ieeexplore.ieee.org
59 days ago - … Role-Task Conditional Purpose Policy protection model for privacy-preserving
data … are anonymized using the Mondrian algorithm following the k-anonymity paradigm. In …
data … are anonymized using the Mondrian algorithm following the k-anonymity paradigm. In …
[PDF][PDF] Beyond Recognition: Privacy Protections in a Surveilled World
MH Le - diva-portal.org
71 days ago - … that address the balance between privacy and utility in the use of FRS. We
examine the adaptation of k-anonymity to protect individual identities within facial datasets, …
examine the adaptation of k-anonymity to protect individual identities within facial datasets, …
[BOOK][B] Beyond Recognition: Privacy Protections in a Surveilled World
L Minh-Ha - 2024 - books.google.com
73 days ago - … that address the balance between privacy and utility in the use of FRS. We
examine the adaptation of k-anonymity to protect individual identities within facial datasets, …
examine the adaptation of k-anonymity to protect individual identities within facial datasets, …
An Approach to Improve k-Anonymization Practices in Educational Data Mining
78 days ago - … This paper analyzes the effects of k-anonymity in educational data for use in
subsequent educational data mining methods (ie, machine learning models in this case), and …
subsequent educational data mining methods (ie, machine learning models in this case), and …