[HTML][HTML] Data anonymization for pervasive health care: systematic literature mapping study

Z Zuo, M Watson, D Budgen, R Hall… - JMIR medical …, 2021 - medinform.jmir.org
Background Data science offers an unparalleled opportunity to identify new insights into
many aspects of human life with recent advances in health care. Using data science in …

[HTML][HTML] k-Anonymity in practice: How generalisation and suppression affect machine learning classifiers

D Slijepčević, M Henzl, LD Klausner, T Dam… - Computers & …, 2021 - Elsevier
The protection of private information is a crucial issue in data-driven research and business
contexts. Typically, techniques like anonymisation or (selective) deletion are introduced in …

Privacy measurements in tabular synthetic data: State of the art and future research directions

ATP Boudewijn, AF Ferraris, D Panfilo… - … 2023 Workshop on …, 2023 - openreview.net
Synthetic data (SD) have garnered attention as a privacy enhancing technology.
Unfortunately, there is no standard for assessing their degree of privacy protection. In this …

The privacy issue of counterfactual explanations: explanation linkage attacks

S Goethals, K Sörensen, D Martens - ACM Transactions on Intelligent …, 2023 - dl.acm.org
Black-box machine learning models are used in an increasing number of high-stakes
domains, and this creates a growing need for Explainable AI (XAI). However, the use of XAI …

[PDF][PDF] A study on k-anonymity, l-diversity, and t-closeness techniques

K Rajendran, M Jayabalan, ME Rana - IJCSNS, 2017 - researchgate.net
In today's world, most organizations are facing data accumulation in massive amounts and
storing them in large databases. Myriad of them, the particular healthcare industry has …

[HTML][HTML] KAB: A new k-anonymity approach based on black hole algorithm

L Kacha, A Zitouni, M Djoudi - Journal of King Saud University-Computer …, 2022 - Elsevier
K-anonymity is the most widely used approach to privacy preserving microdata which is
mainly based on generalization. Although generalization-based k-anonymity approaches …

Scalable, high-performance, and generalized subtree data anonymization approach for Apache Spark

SU Bazai, J Jang-Jaccard, H Alavizadeh - Electronics, 2021 - mdpi.com
Data anonymization strategies such as subtree generalization have been hailed as
techniques that provide a more efficient generalization strategy compared to full-tree …

Optimization-based k-anonymity algorithms

Y Liang, R Samavi - Computers & Security, 2020 - Elsevier
In this paper we present a formulation of k-anonymity as a mathematical optimization
problem. In solving this formulated problem, k-anonymity is achieved while maximizing the …

Does -Anonymous Microaggregation Affect Machine-Learned Macrotrends?

A Rodriguez-Hoyos, J Estrada-Jiménez… - IEEE …, 2018 - ieeexplore.ieee.org
In the era of big data, the availability of massive amounts of information makes privacy
protection more necessary than ever. Among a variety of anonymization mechanisms …

In-memory data anonymization using scalable and high performance rdd design

SU Bazai, J Jang-Jaccard - Electronics, 2020 - mdpi.com
Recent studies in data anonymization techniques have primarily focused on MapReduce.
However, these existing MapReduce based approaches often suffer from many performance …