Attribute disclosure risk for k-anonymity: the case of numerical data
Abstract k-Anonymity is one of the most well-known privacy models. Internal and external
attacks were discussed for this privacy model, both focusing on categorical data. These …
attacks were discussed for this privacy model, both focusing on categorical data. These …
Solving Truthfulness-Privacy Trade-off in Mixed Data Outsourcing by Using Data Balancing and Attribute Correlation-Aware Differential Privacy
A Majeed, SO Hwang - IEEE Access, 2025 - ieeexplore.ieee.org
In the modern era, data of diverse types (medical, financial, etc.) are outsourced from data
owner environments to the public domains for data mining and knowledge discovery …
owner environments to the public domains for data mining and knowledge discovery …
[HTML][HTML] A hierarchical distributed trusted location service achieving location k-anonymity against the global observer
As widely known in the literature, location-based services can seriously threaten users'
privacy. Privacy-aware location-based services can be obtained by protecting the user's …
privacy. Privacy-aware location-based services can be obtained by protecting the user's …
Designing a Novel Approach Using a Greedy and Information-Theoretic Clustering-Based Algorithm for Anonymizing Microdata Sets
Data anonymization is a technique that safeguards individuals' privacy by modifying attribute
values in published data. However, increased modifications enhance privacy but diminish …
values in published data. However, increased modifications enhance privacy but diminish …
Unveiling the Privacy Risk: A Trade-Off Between User Behavior and Information Propagation in Social Media
This study delves into the privacy risks associated with user interactions in complex
networks such as those generated on social media platforms. In such networks, potentially …
networks such as those generated on social media platforms. In such networks, potentially …
Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge
Data processors increasingly rely on external data sources to improve strategic or
operational decision taking. Data owners can facilitate this by releasing datasets directly to …
operational decision taking. Data owners can facilitate this by releasing datasets directly to …
Advanced methods for generalizing time and duration during dataset anonymization
Time is an often recurring quasi-identifying attribute in many datasets. Anonymizing such
datasets requires generalizing the time attribute (s) in the dataset. Examples are start dates …
datasets requires generalizing the time attribute (s) in the dataset. Examples are start dates …
[PDF][PDF] Lost in the Crowd: k-unmatchability in Anonymized Knowledge Graphs
PA Bonatti, F Magliocca, L Sauro - Proceedings of the 21st …, 2024 - proceedings.kr.org
This paper introduces and investigates k-unmatchability, a counterpart of k-anonymity for
knowledge graphs. Like kanonymity, k-unmatchability enhances privacy by ensuring that …
knowledge graphs. Like kanonymity, k-unmatchability enhances privacy by ensuring that …
Reproducibility in Transportation Research: Importance, Best Practices, and Dealing with Protected and Sensitive Data
JS Wood, I van Schalkwyk - Journal of Transportation Technologies, 2024 - scirp.org
Reproducibility is a key aspect of the scientific method as it provides evidence for research
claims. It is essential to promote openness, accessibility, and collaboration within the …
claims. It is essential to promote openness, accessibility, and collaboration within the …
Optimizing Privacy While Limiting Information Loss in Distributed Data Anonymization
AVD Nanfack, G Le Mahec… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
k-anonymity [1],[2], aims to ensure that individual data cannot be distinguished from that of at
least (k− 1) others in the same database, regardless of additional knowledge. However, this …
least (k− 1) others in the same database, regardless of additional knowledge. However, this …