Articles added in the last year, sorted by date

Privacy in manifolds: Combining k-anonymity with differential privacy on Fr�chet means

S Garg, V Torra�- Computers & security (Print), 2024 - diva-portal.org
9 days ago - … (𝜖) in DP and k in k-anonymity on the manifold distance, … k-Anonymity and
Differential Privacy models for fixed distortions. Our findings demonstrate that anonymizing using

Differentially Private Inductive Miner

M Schulze, Y Zisgen, M Kirschte, E Mohammadi…�- arXiv preprint arXiv�…, 2024 - arxiv.org
13 days ago - … areas that focus on privacy measures that do … privacy as DP or are parallel
to our work by protecting the mining process cryptographically. K-anonymity methods to protect

A systematic comparison of measures for k-anonymity in networks

RG de Jong, MPJ van der Loo, FW Takes�- arXiv preprint arXiv�…, 2024 - arxiv.org
15 days ago - … is 𝑘-anonymity. This approach ultimately enables one to share an anonymized
version of the full network data while protecting … When using 𝑘-anonymity to this end, one …

BB-FLoC: A Blockchain-based Targeted Advertisement Scheme with K-Anonymity

E Kruminis, K Navaie, O Ascigil�- Distributed Ledger Technologies�…, 2024 - dl.acm.org
34 days ago - … In the context of our model, we define satisfying the k-anonymity threshold as
simply having at least k number of active users within the same cohort; this idea of “hiding in …

Anonymizing Big Data Streams Using In-memory Processing: A Novel Model Based on One-time Clustering

E Shamsinejad, T Banirostam, MM Pedram…�- Journal of Signal�…, 2024 - Springer
54 days ago - … One of the common methods to protect data privacy is to … certain level of privacy
protection, such as k-anonymity, l-… for anonymizing big data using k-anonymity algorithms. …

[PDF][PDF] Privacy in the Digital Age: Navigating the Risks and Benefits of Cybersecurity Measures

C Farnell, P Huff, W Cox�- Human Privacy in Virtual and Physical�…, 2024 - library.oapen.org
54 days ago - … Keeping data private can be accomplished through a procedure known as k-anonymity.
K-anonymity : The idea behind K-anonymity has been around since 1986 when …

Score, Arrange and Cluster: A novel clustering-based technique for Privacy Preserving Data Publishing

CN Sowmyarani, LG Namya, GK Nidhi…�- IEEE Access, 2024 - ieeexplore.ieee.org
59 days ago - … Role-Task Conditional Purpose Policy protection model for privacy-preserving
data … are anonymized using the Mondrian algorithm following the k-anonymity paradigm. In …

[PDF][PDF] Beyond Recognition: Privacy Protections in a Surveilled World

MH Le - diva-portal.org
71 days ago - … that address the balance between privacy and utility in the use of FRS. We
examine the adaptation of k-anonymity to protect individual identities within facial datasets, …

[BOOK][B] Beyond Recognition: Privacy Protections in a Surveilled World

L Minh-Ha - 2024 - books.google.com
73 days ago - … that address the balance between privacy and utility in the use of FRS. We
examine the adaptation of k-anonymity to protect individual identities within facial datasets, …

An Approach to Improve k-Anonymization Practices in Educational Data Mining

F Stinar, Z Xiong, N Bosch�- Journal of�…, 2024 - jedm.educationaldatamining.org
78 days ago - … This paper analyzes the effects of k-anonymity in educational data for use in
subsequent educational data mining methods (ie, machine learning models in this case), and …