Attribute disclosure risk for k-anonymity: the case of numerical data

V Torra, G Navarro-Arribas - International Journal of Information Security, 2023 - Springer
Abstract k-Anonymity is one of the most well-known privacy models. Internal and external
attacks were discussed for this privacy model, both focusing on categorical data. These …

Solving Truthfulness-Privacy Trade-off in Mixed Data Outsourcing by Using Data Balancing and Attribute Correlation-Aware Differential Privacy

A Majeed, SO Hwang - IEEE Access, 2025 - ieeexplore.ieee.org
In the modern era, data of diverse types (medical, financial, etc.) are outsourced from data
owner environments to the public domains for data mining and knowledge discovery …

[HTML][HTML] A hierarchical distributed trusted location service achieving location k-anonymity against the global observer

F Buccafurri, V De Angelis, MF Idone, C Labrini - Computer Networks, 2024 - Elsevier
As widely known in the literature, location-based services can seriously threaten users'
privacy. Privacy-aware location-based services can be obtained by protecting the user's …

Designing a Novel Approach Using a Greedy and Information-Theoretic Clustering-Based Algorithm for Anonymizing Microdata Sets

RA Khatir, H Izadkhah, J Razmara - Entropy, 2023 - mdpi.com
Data anonymization is a technique that safeguards individuals' privacy by modifying attribute
values in published data. However, increased modifications enhance privacy but diminish …

Unveiling the Privacy Risk: A Trade-Off Between User Behavior and Information Propagation in Social Media

G Livraga, A Olzojevs, M Viviani - International Conference on Complex …, 2023 - Springer
This study delves into the privacy risks associated with user interactions in complex
networks such as those generated on social media platforms. In such networks, potentially …

Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge

K De Boeck, J Verdonck, M Willocx, J Lapon… - Proceedings of the 19th …, 2024 - dl.acm.org
Data processors increasingly rely on external data sources to improve strategic or
operational decision taking. Data owners can facilitate this by releasing datasets directly to …

Advanced methods for generalizing time and duration during dataset anonymization

J Verdonck, K De Boeck, M Willocx… - Proceedings of the 19th …, 2024 - dl.acm.org
Time is an often recurring quasi-identifying attribute in many datasets. Anonymizing such
datasets requires generalizing the time attribute (s) in the dataset. Examples are start dates …

[PDF][PDF] Lost in the Crowd: k-unmatchability in Anonymized Knowledge Graphs

PA Bonatti, F Magliocca, L Sauro - Proceedings of the 21st …, 2024 - proceedings.kr.org
This paper introduces and investigates k-unmatchability, a counterpart of k-anonymity for
knowledge graphs. Like kanonymity, k-unmatchability enhances privacy by ensuring that …

Reproducibility in Transportation Research: Importance, Best Practices, and Dealing with Protected and Sensitive Data

JS Wood, I van Schalkwyk - Journal of Transportation Technologies, 2024 - scirp.org
Reproducibility is a key aspect of the scientific method as it provides evidence for research
claims. It is essential to promote openness, accessibility, and collaboration within the …

Optimizing Privacy While Limiting Information Loss in Distributed Data Anonymization

AVD Nanfack, G Le Mahec… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
k-anonymity [1],[2], aims to ensure that individual data cannot be distinguished from that of at
least (k− 1) others in the same database, regardless of additional knowledge. However, this …