[1]
|
An anonymization-based privacy-preserving data collection protocol for digital health data
Frontiers in Public Health,
2023
DOI:10.3389/fpubh.2023.1125011
|
|
|
[2]
|
A Survey of Privacy Risks and Mitigation Strategies in the Artificial Intelligence Life Cycle
IEEE Access,
2023
DOI:10.1109/ACCESS.2023.3287195
|
|
|
[3]
|
Utility-Aware Data Anonymization Model for Healthcare Information
2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta),
2022
DOI:10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00372
|
|
|
[4]
|
Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud
Expert Systems with Applications,
2022
DOI:10.1016/j.eswa.2022.117086
|
|
|
[5]
|
Robustness of k-Anonymization Model in Compliance with General Data Protection Regulation
2022 5th International Conference on Computing and Big Data (ICCBD),
2022
DOI:10.1109/ICCBD56965.2022.10080616
|
|
|
[6]
|
A Targeted Privacy-Preserving Data Publishing Method Based on Bayesian Network
IEEE Access,
2022
DOI:10.1109/ACCESS.2022.3201641
|
|
|
[7]
|
Robustness of k-Anonymization Model in Compliance with General Data Protection Regulation
2022 5th International Conference on Computing and Big Data (ICCBD),
2022
DOI:10.1109/ICCBD56965.2022.10080616
|
|
|
[8]
|
When Machine Learning Meets Privacy
ACM Computing Surveys,
2022
DOI:10.1145/3436755
|
|
|
[9]
|
When Machine Learning Meets Privacy
ACM Computing Surveys,
2022
DOI:10.1145/3436755
|
|
|
[10]
|
A Targeted Privacy-Preserving Data Publishing Method Based on Bayesian Network
IEEE Access,
2022
DOI:10.1109/ACCESS.2022.3201641
|
|
|
[11]
|
Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud
Expert Systems with Applications,
2022
DOI:10.1016/j.eswa.2022.117086
|
|
|
[12]
|
Comprehensive Analysis of Privacy Preserving Data Mining Algorithms for Future Develop Trends
International Research Journal of Computer Science,
2022
DOI:10.26562/irjcs.2022.v0910.01
|
|
|
[13]
|
Systematic Analysis of Predictive Modeling Methods in Stock Markets
International Research Journal of Computer Science,
2022
DOI:10.26562/irjcs.2022.v0911.01
|
|
|
[14]
|
PETchain: A Blockchain-Based Privacy Enhancing Technology
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3064896
|
|
|
[15]
|
Data mining privacy preserving: Research agenda
WIREs Data Mining and Knowledge Discovery,
2021
DOI:10.1002/widm.1392
|
|
|
[16]
|
Advances in E-Business Engineering for Ubiquitous Computing
Lecture Notes on Data Engineering and Communications Technologies,
2020
DOI:10.1007/978-3-030-34986-8_39
|
|
|
[17]
|
Data mining privacy preserving: Research agenda
WIREs Data Mining and Knowledge Discovery,
2020
DOI:10.1002/widm.1392
|
|
|
[18]
|
Privacy-Preserving Clustering for Big Data in Cyber-Physical-Social Systems: Survey and Perspectives
Information Sciences,
2019
DOI:10.1016/j.ins.2019.10.019
|
|
|
[19]
|
A New Privacy Preserving Data Publishing Technique Conserving Accuracy of Classification on Anonymized Data
Signal and Data Processing,
2018
DOI:10.29252/jsdp.15.3.31
|
|
|
[20]
|
Hybrid Approach with Zero Mean Distribution and Randomization for Privacy Preservation Technique
2017 International Conference on Innovations in Control, Communication and Information Systems (ICICCI),
2017
DOI:10.1109/ICICCIS.2017.8660764
|
|
|
[21]
|
Share a pie?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
2017
DOI:10.1145/3029806.3029817
|
|
|
[22]
|
Share a pie?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17,
2017
DOI:10.1145/3029806.3029817
|
|
|
[23]
|
Classification and evaluation of Privacy Preserving Data Mining: A review
2017 IEEE AFRICON,
2017
DOI:10.1109/AFRCON.2017.8095593
|
|
|
[24]
|
Attribute based diversity model for privacy preservation
2017 8th International Conference on Information Technology (ICIT),
2017
DOI:10.1109/ICITECH.2017.8080053
|
|
|
[25]
|
Enhanced additive noise approach for privacy-preserving tabular data publishing
2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS),
2017
DOI:10.1109/INTELCIS.2017.8260076
|
|
|
[26]
|
Challenges on Anonymity, Privacy, and Big Data
2016 Seventh Latin-American Symposium on Dependable Computing (LADC),
2016
DOI:10.1109/LADC.2016.34
|
|
|
[27]
|
Privacy preserving data mining on published data in healthcare: A survey
2016 7th International Conference on Computer Science and Information Technology (CSIT),
2016
DOI:10.1109/CSIT.2016.7549444
|
|
|
[28]
|
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
Journal of Information Security,
2015
DOI:10.4236/jis.2015.63019
|
|
|
[29]
|
The Impact of Anonymization for Automated Essay Scoring
Journal of Educational Measurement,
2015
DOI:10.1111/jedm.12093
|
|
|
[30]
|
An improved Ambiguity+ anonymization technique with enhanced data utility
2015 7th Conference on Information and Knowledge Technology (IKT),
2015
DOI:10.1109/IKT.2015.7288743
|
|
|
[31]
|
The Impact of Anonymization for Automated Essay Scoring
Journal of Educational Measurement,
2015
DOI:10.1111/jedm.12093
|
|
|
[32]
|
Privacy-Preserving Health Data Collection for Preschool Children
Computational and Mathematical Methods in Medicine,
2013
DOI:10.1155/2013/501607
|
|
|