"Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing"
written by Abou-el-ela Abdou Hussien, Nermin Hamza, Hesham A. Hefny,
published by Journal of Information Security, Vol.4 No.2, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives
2020
[2] Analyzing Small Businesses' Adoption of Big Data Security Analytics
2019
[3] Extending a re-identification risk-based anonymisation framework and evaluating its impact on data mining classifiers
2019
[4] A study on T-Closeness over K-anonymization Technique for Privacy Preserving in Big Data
International Journal of Engineering Research & Technology, 2019
[5] An efficient privacy preserving protocol for dynamic continuous data collection
2019
[6] Privacy as a Service: Anonymisation of NetFlow Traces
2019
[7] Anonymisation de données par généralisation
A guided method, Ingénierie des Systèmes d’Information, 2018
[8] FCMRSA: Privacy Preservation with Clustering and Cryptographic Technique in Data Mining
2018
[9] A New Privacy Preserving Data Publishing Technique Conserving Accuracy of Classification on Anonymized Data
2018
[10] Restricted Sensitive Attributes-based Sequential Anonymization (RSA-SA) approach for privacy-preserving data stream publishing
Knowledge-Based Systems, 2018
[11] Anonymisation de données par généralisation. Méthode avec guidage
2018
[12] On Minimality Attack for Privacy-Preserving Data Publishing
2018
[13] Anonymization based privacy preservation over cloud data using incremental clustering and map reduce approach on big data
2017
[14] Share a pie? Privacy-Preserving Knowledge Base Export through Count-min Sketches
2017
[15] On Minimality Attack in Privacy Preserving Data Publishing
2017
[16] Enhanced additive noise approach for privacy-preserving tabular data publishing
2017
[17] Classification and evaluation of Privacy Preserving Data Mining: A review
2017
[18] Attribute based diversity model for privacy preservation
2017
[19] Privacy-preserving tabular data publishing: a comprehensive evaluation from web to cloud
Computers & Security, 2017
[20] Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment
Information Systems, 2017
[21] A Study on k-anonymity, l-diversity, and t-closeness Techniques
2017
[22] Share a pie?: Privacy-Preserving Knowledge Base Export through Count-min Sketches
CODASPY 2017 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017
[23] Hybrid Approach with Zero Mean Distribution and Randomization for Privacy Preservation Technique
2017
[24] PRIVACY PRESERVING DATA MINING TECHNIQUES USING RECENT ALGORITHMS
2016
[25] Data Security: Modified Privacy-Preserving Data Mining Algorithm
2016
[26] Protecting Sensitive Knowledge with Effective Privacy Preservation
International Journal of Applied Engineering Research [IJAER], 2016
[27] Clustering Based L-Diversity Anonymity Model for Privacy Preservation of Data Publishing
International Journal of Enhanced Research in Science, Technology & Engineering, 2016
[28] 几种隐私数据挖掘算法研究进展
大众科技, 2016
[29] Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms
International Journal of Computer Applications, 2016
[30] Challenges on Anonymity, Privacy, and Big Data
2016
[31] Privacy Preserving Data Mining On Published Data in Healthcare: A Survey
2016
[32] Re-identification attacks—A systematic literature review
International Journal of Information Management, 2016
[33] Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications
Computer Networks, 2015
[34] An improved Ambiguity+anonymization technique with enhanced data utility
2015
[35] Enhanced Privacy Preserving Model for Data Using (α, β, k)-Anonymity Model and Lossy join
2015
[36] Enhanced Privacy Preserving Model for Data Using ([alpha],[Beta],[kappa])-Anonymity Model and Lossy join
International Journal of Computer Science and Information Security, 2015
[37] The Impact of Anonymization for Automated Essay Scoring
Journal of Educational Measurement, 2015
[38] An improved Ambiguity+ anonymization technique with enhanced data utility
Information and Knowledge Technology (IKT), 2015 7th Conference on, 2015
[39] Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
Journal of Information Security, 2015
[40] Survey on Anonymization in Privacy Preserving Data Mining
International Journal of Innovative and Emerging Research in Engineering, 2015
[41] Ethics of Data Mining: a New Zealand Survey
2013
[42] Privacy-Preserving Health Data Collection for Preschool Children
Computational and mathematical methods in medicine, 2013