Technical privacy metrics: a systematic survey

I Wagner, D Eckhoff - ACM Computing Surveys (Csur), 2018 - dl.acm.org
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …

Privacy-preserving data mining: methods, metrics, and applications

R Mendes, JP Vilela - IEEE Access, 2017 - ieeexplore.ieee.org
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …

Information security in big data: privacy and data mining

L Xu, C Jiang, J Wang, J Yuan, Y Ren - Ieee Access, 2014 - ieeexplore.ieee.org
The growing popularity and development of data mining technologies bring serious threat to
the security of individual,'s sensitive information. An emerging research topic in data mining …

Personalized privacy-preserving task allocation for mobile crowdsensing

Z Wang, J Hu, R Lv, J Wei, Q Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Location information of workers are usually required for optimal task allocation in mobile
crowdsensing, which however raises severe concerns of location privacy leakage. Although …

Big privacy: Challenges and opportunities of privacy study in the age of big data

S Yu - IEEE access, 2016 - ieeexplore.ieee.org
One of the biggest concerns of big data is privacy. However, the study on big data privacy is
still at a very early stage. We believe the forthcoming solutions and theories of big data …

t-closeness: Privacy beyond k-anonymity and l-diversity

N Li, T Li, S Venkatasubramanian - 2007 IEEE 23rd …, 2006 - ieeexplore.ieee.org
The k-anonymity privacy requirement for publishing microdata requires that each
equivalence class (ie, a set of records that are indistinguishable from each other with respect …

Privacy-preserving data publishing: A survey of recent developments

BCM Fung, K Wang, R Chen, PS Yu - ACM Computing Surveys (Csur), 2010 - dl.acm.org
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …

[BOEK][B] A general survey of privacy-preserving data mining models and algorithms

CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …

Privacy: Theory meets practice on the map

A Machanavajjhala, D Kifer, J Abowd… - 2008 IEEE 24th …, 2008 - ieeexplore.ieee.org
In this paper, we propose the first formal privacy analysis of a data anonymization process
known as the synthetic data generation, a technique becoming popular in the statistics …

Preserving privacy in social networks against neighborhood attacks

B Zhou, J Pei - 2008 IEEE 24th International Conference on …, 2008 - ieeexplore.ieee.org
Recently, as more and more social network data has been published in one way or another,
preserving privacy in publishing social network data becomes an important concern. With …