Privacy-preserving data publishing: A survey of recent developments

BCM Fung, K Wang, R Chen, PS Yu - ACM Computing Surveys (Csur), 2010‏ - dl.acm.org
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …

A review of anonymization for healthcare data

IE Olatunji, J Rauch, M Katzensteiner, M Khosla - Big data, 2024‏ - liebertpub.com
Mining health data can lead to faster medical decisions, improvement in the quality of
treatment, disease prevention, and reduced cost, and it drives innovative solutions within the …

Using artificial intelligence to detect crisis related to events: Decision making in B2B by artificial intelligence

A Farrokhi, F Shirazi, N Hajli, M Tajvidi - Industrial marketing management, 2020‏ - Elsevier
Artificial Intelligence (AI) could be an important foundation of competitive advantage in the
market for firms. As such, firms use AI to achieve deep market engagement when the firm's …

K-automorphism: A general framework for privacy preserving network publication

L Zou, L Chen, MT Özsu - Proceedings of the VLDB Endowment, 2009‏ - dl.acm.org
The growing popularity of social networks has generated interesting data management and
data mining problems. An important concern in the release of these data for study is their …

Slicing: A new approach for privacy preserving data publishing

T Li, N Li, J Zhang, I Molloy - IEEE transactions on knowledge …, 2010‏ - ieeexplore.ieee.org
Several anonymization techniques, such as generalization and bucketization, have been
designed for privacy preserving microdata publishing. Recent work has shown that …

Privacy-preserving trajectory data publishing by local suppression

R Chen, BCM Fung, N Mohammed, BC Desai… - Information Sciences, 2013‏ - Elsevier
The pervasiveness of location-aware devices has spawned extensive research in trajectory
data mining, resulting in many important real-life applications. Yet, the privacy issue in …

Privacy in Internet of Things: From principles to technologies

C Li, B Palanisamy - IEEE Internet of Things Journal, 2018‏ - ieeexplore.ieee.org
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed
wireless networks have led to the rapid development of the Internet of Things (IoT). IoT …

[کتاب][B] Introduction to privacy-preserving data publishing: Concepts and techniques

BCM Fung, K Wang, AWC Fu, SY Philip - 2010‏ - taylorfrancis.com
Gaining access to high-quality data is a vital necessity in knowledge-based decision
making. But data in its raw form often contains sensitive information about individuals …

Privacy-preserving anonymization of set-valued data

M Terrovitis, N Mamoulis, P Kalnis - Proceedings of the VLDB …, 2008‏ - dl.acm.org
In this paper we study the problem of protecting privacy in the publication of set-valued data.
Consider a collection of transactional data that contains detailed information about items …

Publishing set-valued data via differential privacy

R Chen, N Mohammed, BCM Fung, BC Desai… - Proceedings of the …, 2011‏ - dl.acm.org
Set-valued data provides enormous opportunities for various data mining tasks. In this
paper, we study the problem of publishing set-valued data for data mining tasks under the …