Using text mining to establish knowledge graph from accident/incident reports in risk assessment

C Liu, S Yang - Expert Systems with Applications, 2022‏ - Elsevier
To clarify the risk factors and propagation characteristics affecting railway safety, we learn
from historical reports to build a connected network of hazards and accidents, forming a …

[HTML][HTML] A comprehensive analysis of privacy-preserving solutions developed for online social networks

A Majeed, S Khan, SO Hwang - Electronics, 2022‏ - mdpi.com
Owning to the massive growth in internet connectivity, smartphone technology, and digital
tools, the use of various online social networks (OSNs) has significantly increased. On the …

A novel approach to create synthetic biomedical signals using BiRNN

A Hernandez-Matamoros, H Fujita, H Perez-Meana - Information Sciences, 2020‏ - Elsevier
Human health is threatened by several diseases for this reason automated medical
diagnosis systems has been developed several years ago. These systems need databases …

A user sensitive subject protection approach for book search service

Z Wu, R Li, Z Zhou, J Guo, J Jiang… - Journal of the Association …, 2020‏ - Wiley Online Library
In a digital library, book search is one of the most important information services. However,
with the rapid development of network technologies such as cloud computing, the server …

Fractal intelligent privacy protection in online social network using attribute-based encryption schemes

W Wei, S Liu, W Li, D Du - IEEE Transactions on Computational …, 2018‏ - ieeexplore.ieee.org
While the online social network (OSN) has brought much convenience to users, there are
still some serious problems, such as personal privacy leaks. Today, OSN security and …

PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks

Q Huang, Y Yang, J Fu - Future Generation Computer Systems, 2018‏ - Elsevier
Online social networks (OSNs) have become popular around the world due to its openness.
Although cryptographic techniques can provide privacy protection for users in OSNs, several …

A sanitization approach for privacy preserving data mining on social distributed environment

PL Lekshmy, MA Rahiman - Journal of Ambient Intelligence and …, 2020‏ - Springer
Data owners worry about their private data in the information that is being uncovered without
authorization in the cloud computing environment. While applying privacy preserving …

Sanitizing and measuring privacy of large sparse datasets for recommender systems

J Salas - Journal of Ambient Intelligence and Humanized …, 2023‏ - Springer
Big Data is characterized by large volumes of highly dynamical data and is used for
discovering hidden trends and correlations. However, as more data is collected, previous …

A synthetic data generator for online social network graphs

DF Nettleton - Social Network Analysis and Mining, 2016‏ - Springer
Two of the difficulties for data analysts of online social networks are (1) the public availability
of data and (2) respecting the privacy of the users. One possible solution to both of these …

Scalable non-deterministic clustering-based k-anonymization for rich networks

M Ros-Martin, J Salas, J Casas-Roma - International Journal of Information …, 2019‏ - Springer
In this paper, we tackle the problem of graph anonymization in the context of privacy-
preserving social network mining. We present a greedy and non-deterministic algorithm to …