[HTML][HTML] A survey of privacy-preserving mechanisms for heterogeneous data types
Due to the pervasiveness of always connected devices, large amounts of heterogeneous
data are continuously being collected. Beyond the benefits that accrue for the users, there …
data are continuously being collected. Beyond the benefits that accrue for the users, there …
Privacy preserving social network data publication
The introduction of online social networks (OSN) has transformed the way people connect
and interact with each other as well as share information. OSN have led to a tremendous …
and interact with each other as well as share information. OSN have led to a tremendous …
Information security in big data: privacy and data mining
The growing popularity and development of data mining technologies bring serious threat to
the security of individual,'s sensitive information. An emerging research topic in data mining …
the security of individual,'s sensitive information. An emerging research topic in data mining …
A survey on data pricing: from economics to data science
J Pei - IEEE Transactions on knowledge and Data …, 2020 - ieeexplore.ieee.org
Data are invaluable. How can we assess the value of data objectively, systematically and
quantitatively? Pricing data, or information goods in general, has been studied and practiced …
quantitatively? Pricing data, or information goods in general, has been studied and practiced …
Differentially private distributed Nash equilibrium seeking for aggregative games
This article considers the privacy-preserving distributed Nash equilibrium seeking strategy
design for average aggregative games, in which the players' objective functions are …
design for average aggregative games, in which the players' objective functions are …
Sok: Privacy-preserving data synthesis
As the prevalence of data analysis grows, safeguarding data privacy has become a
paramount concern. Consequently, there has been an upsurge in the development of …
paramount concern. Consequently, there has been an upsurge in the development of …
Combined fuzzy clustering and firefly algorithm for privacy preserving in social networks
In recent years, an explosive growth of social networks has been made publicly available for
understanding the behavior of users and data mining purposes. The main challenge in …
understanding the behavior of users and data mining purposes. The main challenge in …
Anonymization of centralized and distributed social networks by sequential clustering
T Tassa, DJ Cohen - IEEE Transactions on Knowledge and …, 2011 - ieeexplore.ieee.org
We study the problem of privacy-preservation in social networks. We consider the distributed
setting in which the network data is split between several data holders. The goal is to arrive …
setting in which the network data is split between several data holders. The goal is to arrive …
Scalable graph processing frameworks: A taxonomy and open challenges
The world is becoming a more conjunct place and the number of data sources such as
social networks, online transactions, web search engines, and mobile devices is increasing …
social networks, online transactions, web search engines, and mobile devices is increasing …
A systematic comparison and evaluation of k-anonymization algorithms for practitioners
The vast amount of data being collected about individuals has brought new challenges in
protecting their privacy when this data is disseminated. As a result, Privacy-Preserving Data …
protecting their privacy when this data is disseminated. As a result, Privacy-Preserving Data …