Journal articles on the topic 'Privacy preserving techniques; private data publishing; anonymization'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 35 journal articles for your research on the topic 'Privacy preserving techniques; private data publishing; anonymization.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Renuka, S. "A Study of Privacy Preserving Using Anonymization Techniques." Asian Journal of Computer Science and Technology 8, S2 (March 5, 2019): 31–34. http://dx.doi.org/10.51983/ajcst-2019.8.s2.2029.
Full textQamar, T., N. Z. Bawany, and N. A. Khan. "EDAMS: Efficient Data Anonymization Model Selector for Privacy-Preserving Data Publishing." Engineering, Technology & Applied Science Research 10, no. 2 (April 4, 2020): 5423–27. http://dx.doi.org/10.48084/etasr.3374.
Full textNehra, Nisha, and Suneet Kumar. "Privacy Preserving Anonymization Schemes-On Transaction Data Publishing." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4623–26. http://dx.doi.org/10.1166/jctn.2020.9289.
Full textAl-Zobbi, Mohammed Essa, Seyed Shahrestani, and Chun Ruan. "Achieving Optimal K-Anonymity Parameters for Big Data." International Journal of Information, Communication Technology and Applications 4, no. 1 (May 15, 2018): 23–33. http://dx.doi.org/10.17972/ijicta20184136.
Full textShankar, Adam Gowri. "Differential Privacy Preserving in Big data Analytics for Body Area Networks." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 514–18. http://dx.doi.org/10.22214/ijraset.2021.39336.
Full text., Kavita Rodiya. "A REVIEW ON ANONYMIZATION TECHNIQUES FOR PRIVACY PRESERVING DATA PUBLISHING." International Journal of Research in Engineering and Technology 04, no. 11 (November 25, 2015): 228–31. http://dx.doi.org/10.15623/ijret.2015.0411039.
Full textSowmyarani C N, Dr, and Dr Dayananda P. "K-Anonymity Versus L-Diversity: A Comparative Analysis on Data Anonymization Techniques." International Journal of Engineering & Technology 7, no. 3.4 (June 25, 2018): 24. http://dx.doi.org/10.14419/ijet.v7i3.4.14669.
Full textWidodo, Eko Kuswardono Budiardjo, and Wahyu Catur Wibowo. "Privacy Preserving Data Publishing with Multiple Sensitive Attributes based on Overlapped Slicing." Information 10, no. 12 (November 21, 2019): 362. http://dx.doi.org/10.3390/info10120362.
Full textAdegunwa, Oluwabiyi Akinkunmi, and Muhammad Ehsan Rana. "Privacy Preserving Data Publishing Anonymization Methods for Limiting Malicious Attacks in Healthcare Records." Journal of Computational and Theoretical Nanoscience 16, no. 8 (August 1, 2019): 3538–43. http://dx.doi.org/10.1166/jctn.2019.8320.
Full textVictor, Nancy, and Daphne Lopez. "Privacy Preserving Sensitive Data Publishing using (k,n,m) Anonymity Approach." Journal of communications software and systems 16, no. 1 (March 15, 2020): 46–56. http://dx.doi.org/10.24138/jcomss.v16i1.825.
Full textErfani, Seyedeh Hamideh, and Reza Mortazavi. "A Novel Graph-modification Technique for User Privacy-preserving on Social Networks." Journal of Telecommunications and Information Technology 3 (September 30, 2019): 27–38. http://dx.doi.org/10.26636/jtit.2019.134319.
Full textParameshwarappa, Pooja, Zhiyuan Chen, and Güneş Koru. "Anonymization of Daily Activity Data by Using ℓ-diversity Privacy Model." ACM Transactions on Management Information Systems 12, no. 3 (May 31, 2021): 1–21. http://dx.doi.org/10.1145/3456876.
Full textZhou, Bin, Jian Pei, and WoShun Luk. "A brief survey on anonymization techniques for privacy preserving publishing of social network data." ACM SIGKDD Explorations Newsletter 10, no. 2 (December 20, 2008): 12–22. http://dx.doi.org/10.1145/1540276.1540279.
Full textHAJIAN, SARA, and MOHAMMAD ABDOLLAHI AZGOMI. "ON THE USE OF HAAR WAVELET TRANSFORM AND SCALING DATA PERTURBATION FOR PRIVACY PRESERVING CLUSTERING OF LARGE DATASETS." International Journal of Wavelets, Multiresolution and Information Processing 09, no. 06 (November 2011): 867–904. http://dx.doi.org/10.1142/s0219691311004365.
Full textNarula, Deepak, Pardeep Kumar, and Shuchita Upadhyaya. "Evaluation of proposed amalgamated anonymization approach." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1439. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1439-1446.
Full textMadan, Suman, and Puneet Goswami. "k-DDD Measure and MapReduce Based Anonymity Model for Secured Privacy-Preserving Big Data Publishing." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 27, no. 02 (April 2019): 177–99. http://dx.doi.org/10.1142/s0218488519500089.
Full textMajeed, Abdul, Safiullah Khan, and Seong Oun Hwang. "A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks." Electronics 11, no. 13 (June 21, 2022): 1931. http://dx.doi.org/10.3390/electronics11131931.
Full textIndhumathi, R., and S. Sathiya Devi. "Anonymization Based on Improved Bucketization (AIB): A Privacy-Preserving Data Publishing Technique for Improving Data Utility in Healthcare Data." Journal of Medical Imaging and Health Informatics 11, no. 12 (December 1, 2021): 3164–73. http://dx.doi.org/10.1166/jmihi.2021.3901.
Full textGál, Tamás Zoltán, Gábor Kovács, and Zsolt T. Kardkovács. "Survey on privacy preserving data mining techniques in health care databases." Acta Universitatis Sapientiae, Informatica 6, no. 1 (June 1, 2014): 33–55. http://dx.doi.org/10.2478/ausi-2014-0017.
Full textRam Prasad Reddy, S., K. VSVN Raju, and V. Valli Kumari. "A Novel Approach for Personalized Privacy Preserving Data Publishing with Multiple Sensitive Attributes." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 197. http://dx.doi.org/10.14419/ijet.v7i2.20.13296.
Full textBild, Raffael, Klaus A. Kuhn, and Fabian Prasser. "SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (January 1, 2018): 67–87. http://dx.doi.org/10.1515/popets-2018-0004.
Full textKhan, Razaullah, Xiaofeng Tao, Adeel Anjum, Haider Sajjad, Saif ur Rehman Malik, Abid Khan, and Fatemeh Amiri. "Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity." Wireless Communications and Mobile Computing 2020 (January 28, 2020): 1–18. http://dx.doi.org/10.1155/2020/8416823.
Full textXu, Yong, Shan Ying Zhou, and Yu Tao Sun. "Study on Privacy Preserving Technology in Data Publishing Scenario." Applied Mechanics and Materials 170-173 (May 2012): 3658–61. http://dx.doi.org/10.4028/www.scientific.net/amm.170-173.3658.
Full textKjamilji, Artrim. "Techniques and Challenges while Applying Machine Learning Algorithms in Privacy Preserving Fashion." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): xix. http://dx.doi.org/10.14421/icse.v3.600.
Full textSowmyarani C. N., Veena Gadad, and Dayananda P. "(p+, α, t)-Anonymity Technique Against Privacy Attacks." International Journal of Information Security and Privacy 15, no. 2 (April 2021): 68–86. http://dx.doi.org/10.4018/ijisp.2021040104.
Full textQureshi, Kashif Naseer, Luqman Shahzad, Abdelzahir Abdelmaboud, Taiseer Abdalla Elfadil Eisa, Bandar Alamri, Ibrahim Tariq Javed, Arafat Al-Dhaqm, and Noel Crespi. "A Blockchain-Based Efficient, Secure and Anonymous Conditional Privacy-Preserving and Authentication Scheme for the Internet of Vehicles." Applied Sciences 12, no. 1 (January 4, 2022): 476. http://dx.doi.org/10.3390/app12010476.
Full textSharma, Shipra, Naveen Choudhary, and Kalpana Jain. "A Study on Models and Techniques of Anonymization in Data Publishing." International Journal of Scientific Research in Science, Engineering and Technology, March 8, 2019, 84–90. http://dx.doi.org/10.32628/ijsrset19629.
Full textMajeed, Abdul, and Sungchang Lee. "Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey." IEEE Access, 2020, 1. http://dx.doi.org/10.1109/access.2020.3045700.
Full text"AN ENHANCED DATA ANONYMIZATION APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING IN CLOUD COMPUTING BASED ON GENETIC-CHIMP OPTIMIZATION." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 0. http://dx.doi.org/10.4018/ijisp.300326.
Full textChandrakar, Ila. "Improved Technique for Preserving Privacy while Mining Real Time Big Data." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v14i1.5187.
Full textKorolova, Aleksandra. "Privacy Violations Using Microtargeted Ads: A Case Study." Journal of Privacy and Confidentiality 3, no. 1 (June 1, 2011). http://dx.doi.org/10.29012/jpc.v3i1.594.
Full textEL OUAZZANI, ZAKARIAE, and HANAN EL BAKKALI. "A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data." International Journal of Communication Networks and Information Security (IJCNIS) 12, no. 1 (April 17, 2022). http://dx.doi.org/10.17762/ijcnis.v12i1.4401.
Full textSei, Yuichi, and Akihiko Ohsuga. "Privacy-preserving chi-squared test of independence for small samples." BioData Mining 14, no. 1 (January 22, 2021). http://dx.doi.org/10.1186/s13040-021-00238-x.
Full textPatel, Darshana H., Saurabh Shah, and Avani Vasant. "Technique for optimizing of association rule mining by utilizing genetic algorithm." Recent Advances in Computer Science and Communications 13 (September 2, 2019). http://dx.doi.org/10.2174/2213275912666190902115608.
Full textKossen, Tabea, Manuel A. Hirzel, Vince I. Madai, Franziska Boenisch, Anja Hennemuth, Kristian Hildebrand, Sebastian Pokutta, et al. "Toward Sharing Brain Images: Differentially Private TOF-MRA Images With Segmentation Labels Using Generative Adversarial Networks." Frontiers in Artificial Intelligence 5 (May 2, 2022). http://dx.doi.org/10.3389/frai.2022.813842.
Full text