Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review

A Majeed - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Anonymization techniques are widely used to make personal data broadly available for
analytics/data-mining purposes while preserving the privacy of the personal information …

Mastering data privacy: leveraging K-anonymity for robust health data sharing

S Karagiannis, C Ntantogian, E Magkos… - International Journal of …, 2024 - Springer
In modern healthcare systems, data sources are highly integrated, and the privacy
challenges are becoming a paramount concern. Despite the critical importance of privacy …

A Comprehensive Analysis of Trust, Privacy, and Security Measures in the Digital Age

D Das, S Banerjee, P Chatterjee… - 2023 5th IEEE …, 2023 - ieeexplore.ieee.org
In light of the rapidly evolving digital landscape, the necessity of addressing trust, privacy,
and security issues has surged to the forefront for individuals, organizations, and …

Técnicas de anonimización y pseudonimización en la protección de datos personales

JL Córdova-Real, GM López-Sevilla - MQRInvestigar, 2024 - investigarmqr.com
Las técnicas de anonimización y pseudonimización ofrecen a los usuarios la protección de
sus datos personales para evitar que sean difundidos y utilizados con un propósito ajeno …

Privacy Preservation of Big Spatio-Temporal Co-occurrence Data

AM Olawoyin, CK Leung… - 2023 IEEE 47th Annual …, 2023 - ieeexplore.ieee.org
For resilient computing in a sustainable cyber-physical world, it is important to well manage
data including preserving privacy of data. To elaborate, the terms" terms of use,"" public …

Anonymization of Bigdata using ARX Tools

RK Shyamasundar, MK Maurya - 2024 15th International …, 2024 - ieeexplore.ieee.org
Anonymization and sanitization of data has become extremely important in the context of
various privacy laws around the world. K-Anonymity is a widely used technique that is a …

[引用][C] Federated learning and differential privacy in clinical health: Extensive survey

D Odera - World Journal of Advanced …, 2023 - World Journal of Advanced …

A performance analysis of different ensemble and hybrid techniques in credit card fraudulent transactions

A Borah, MD Borah, P Baro - 8th International Conference on …, 2023 - ieeexplore.ieee.org
Recently, the use of payment mediums like credit cards have increased and thus the number
of fraudulent transactions as well. In this situations where anomaly detection is very …