Journal articles on the topic 'Data anonymization'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data anonymization.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lingala, Thirupathi, C. Kishor Kumar Reddy, B. V. Ramana Murthy, Rajashekar Shastry, and YVSS Pragathi. "L-Diversity for Data Analysis: Data Swapping with Customized Clustering." Journal of Physics: Conference Series 2089, no. 1 (November 1, 2021): 012050. http://dx.doi.org/10.1088/1742-6596/2089/1/012050.
Full textTomás, Joana, Deolinda Rasteiro, and Jorge Bernardino. "Data Anonymization: An Experimental Evaluation Using Open-Source Tools." Future Internet 14, no. 6 (May 30, 2022): 167. http://dx.doi.org/10.3390/fi14060167.
Full textPejić Bach, Mirjana, Jasmina Pivar, and Ksenija Dumičić. "Data anonymization patent landscape." Croatian Operational Research Review 8, no. 1 (March 31, 2017): 265–81. http://dx.doi.org/10.17535/crorr.2017.0017.
Full textLasko, Thomas A., and Staal A. Vinterbo. "Spectral Anonymization of Data." IEEE Transactions on Knowledge and Data Engineering 22, no. 3 (March 2010): 437–46. http://dx.doi.org/10.1109/tkde.2009.88.
Full textK., Sivasankari Krishnakumar, and Dr Uma Maheswari K.M. "A Comprehensive Review on Data Anonymization Techniques for Social Networks." Webology 19, no. 1 (January 20, 2022): 380–405. http://dx.doi.org/10.14704/web/v19i1/web19028.
Full textJi, Shouling, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah. "General Graph Data De-Anonymization." ACM Transactions on Information and System Security 18, no. 4 (May 6, 2016): 1–29. http://dx.doi.org/10.1145/2894760.
Full textJang, Sung-Bong, and Young-Woong Ko. "Efficient multimedia big data anonymization." Multimedia Tools and Applications 76, no. 17 (December 1, 2015): 17855–72. http://dx.doi.org/10.1007/s11042-015-3123-2.
Full textKumar, Sindhe Phani, and R. Anandan. "Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing." Journal of Function Spaces 2022 (June 23, 2022): 1–10. http://dx.doi.org/10.1155/2022/8345536.
Full textEt. al., Waleed M. Ead,. "A General Framework Information Loss of Utility-Based Anonymization in Data Publishing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1450–56. http://dx.doi.org/10.17762/turcomat.v12i5.2102.
Full textGießler, Fina, Maximilian Thormann, Bernhard Preim, Daniel Behme, and Sylvia Saalfeld. "Facial Feature Removal for Anonymization of Neurological Image Data." Current Directions in Biomedical Engineering 7, no. 1 (August 1, 2021): 130–34. http://dx.doi.org/10.1515/cdbme-2021-1028.
Full textRuiz, Nicolas. "A General Cipher for Individual Data Anonymization." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 28, no. 05 (September 30, 2020): 727–56. http://dx.doi.org/10.1142/s0218488520500312.
Full textJi, Shouling, Prateek Mittal, and Raheem Beyah. "Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey." IEEE Communications Surveys & Tutorials 19, no. 2 (2017): 1305–26. http://dx.doi.org/10.1109/comst.2016.2633620.
Full textParameshwarappa, Pooja, Zhiyuan Chen, and Gunes Koru. "An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data." International Journal of Information Security and Privacy 14, no. 3 (July 2020): 72–94. http://dx.doi.org/10.4018/ijisp.2020070105.
Full textLiber, Arkadiusz. "The issues connected with the anonymization of medical data. Part 2. Advanced anonymization and anonymization controlled by owner of protected sensitive data." Medical Science Pulse 8, no. 2 (August 7, 2014): 13–24. http://dx.doi.org/10.5604/01.3001.0003.3161.
Full textXu, Heng, and Nan Zhang. "Implications of Data Anonymization on the Statistical Evidence of Disparity." Management Science 68, no. 4 (April 2022): 2600–2618. http://dx.doi.org/10.1287/mnsc.2021.4028.
Full textBazai, Sibghat Ullah, Julian Jang-Jaccard, and Hooman Alavizadeh. "A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark." ACM Transactions on Privacy and Security 25, no. 1 (February 28, 2022): 1–25. http://dx.doi.org/10.1145/3484945.
Full textHemmatazad, Nolan, Robin Gandhi, Qiuming Zhu, and Sanjukta Bhowmick. "The Intelligent Data Brokerage." International Journal of Privacy and Health Information Management 2, no. 1 (January 2014): 22–33. http://dx.doi.org/10.4018/ijphim.2014010102.
Full textHossayni, Hicham, Imran Khan, and Noel Crespi. "Data Anonymization for Maintenance Knowledge Sharing." IT Professional 23, no. 5 (September 1, 2021): 23–30. http://dx.doi.org/10.1109/mitp.2021.3066244.
Full textSopaoglu, Ugur, and Osman Abul. "Classification utility aware data stream anonymization." Applied Soft Computing 110 (October 2021): 107743. http://dx.doi.org/10.1016/j.asoc.2021.107743.
Full textGONG, Qi-Yuan, Ming YANG, and Jun-Zhou LUO. "Data Anonymization Approach for Incomplete Microdata." Journal of Software 24, no. 12 (January 17, 2014): 2883–96. http://dx.doi.org/10.3724/sp.j.1001.2013.04411.
Full textSun, X., H. Wang, J. Li, and Y. Zhang. "Satisfying Privacy Requirements Before Data Anonymization." Computer Journal 55, no. 4 (March 17, 2011): 422–37. http://dx.doi.org/10.1093/comjnl/bxr028.
Full textZakerzadeh, Hessam, Charu C. Aggarwal, and Ken Barker. "Managing dimensionality in data privacy anonymization." Knowledge and Information Systems 49, no. 1 (December 11, 2015): 341–73. http://dx.doi.org/10.1007/s10115-015-0906-8.
Full textGambs, Sébastien, Marc-Olivier Killijian, and Miguel Núñez del Prado Cortez. "De-anonymization attack on geolocated data." Journal of Computer and System Sciences 80, no. 8 (December 2014): 1597–614. http://dx.doi.org/10.1016/j.jcss.2014.04.024.
Full textGál, Tamás Zoltán, Gábor Kovács, and Zsolt T. Kardkovács. "Survey on privacy preserving data mining techniques in health care databases." Acta Universitatis Sapientiae, Informatica 6, no. 1 (June 1, 2014): 33–55. http://dx.doi.org/10.2478/ausi-2014-0017.
Full textVokinger, Kerstin N., Daniel J. Stekhoven, and Michael Krauthammer. "Lost in Anonymization — A Data Anonymization Reference Classification Merging Legal and Technical Considerations." Journal of Law, Medicine & Ethics 48, no. 1 (2020): 228–31. http://dx.doi.org/10.1177/1073110520917025.
Full textArca, Sevgi, and Rattikorn Hewett. "Analytics on Anonymity for Privacy Retention in Smart Health Data." Future Internet 13, no. 11 (October 28, 2021): 274. http://dx.doi.org/10.3390/fi13110274.
Full textMadan, Suman, and Puneet Goswami. "A Technique for Securing Big Data Using K-Anonymization With a Hybrid Optimization Algorithm." International Journal of Operations Research and Information Systems 12, no. 4 (October 2021): 1–21. http://dx.doi.org/10.4018/ijoris.20211001.oa3.
Full textJiang, Lili, and Vicenç Torra. "Data Protection and Multi-Database Data-Driven Models." Future Internet 15, no. 3 (February 27, 2023): 93. http://dx.doi.org/10.3390/fi15030093.
Full textZouinina, Sarah, Younès Bennani, Nicoleta Rogovschi, and Abdelouahid Lyhyaoui. "Data Anonymization through Collaborative Multi-view Microaggregation." Journal of Intelligent Systems 30, no. 1 (October 2, 2020): 327–45. http://dx.doi.org/10.1515/jisys-2020-0026.
Full textAl-Zobbi, Mohammed Essa, Seyed Shahrestani, and Chun Ruan. "Achieving Optimal K-Anonymity Parameters for Big Data." International Journal of Information, Communication Technology and Applications 4, no. 1 (May 15, 2018): 23–33. http://dx.doi.org/10.17972/ijicta20184136.
Full textIndhumathi, R., and S. Sathiya Devi. "Anonymization Based on Improved Bucketization (AIB): A Privacy-Preserving Data Publishing Technique for Improving Data Utility in Healthcare Data." Journal of Medical Imaging and Health Informatics 11, no. 12 (December 1, 2021): 3164–73. http://dx.doi.org/10.1166/jmihi.2021.3901.
Full textAbd Razak, Shukor, Nur Hafizah Mohd Nazari, and Arafat Al-Dhaqm. "Data Anonymization Using Pseudonym System to Preserve Data Privacy." IEEE Access 8 (2020): 43256–64. http://dx.doi.org/10.1109/access.2020.2977117.
Full textM, Abhishek, and Poornima Kulkarni. "BIG DATA PRIVACY ANONYMIZATION ALGORITHMS: A REVIEW." International Journal of Engineering Applied Sciences and Technology 5, no. 4 (August 1, 2020): 147–50. http://dx.doi.org/10.33564/ijeast.2020.v05i04.019.
Full textK, Venkata Ramana, and Valli Kumari V. "Graph Based Local Recoding for Data Anonymization." International Journal of Database Management Systems 5, no. 4 (August 31, 2013): 1–15. http://dx.doi.org/10.5121/ijdms.2013.5401.
Full textBrankovic, Ljiljana, Nacho López, Mirka Miller, and Francesc Sebé. "Triangle randomization for social network data anonymization." Ars Mathematica Contemporanea 7, no. 2 (June 27, 2014): 461–77. http://dx.doi.org/10.26493/1855-3974.220.34c.
Full textWANG, Zhi-Hui, Jian XU, Wei WANG, and Bai-Le SHI. "A Clustering-Based Approach for Data Anonymization." Journal of Software 21, no. 4 (March 11, 2010): 680–93. http://dx.doi.org/10.3724/sp.j.1001.2010.03508.
Full textJi, Shouling, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah. "Structural Data De-Anonymization: Theory and Practice." IEEE/ACM Transactions on Networking 24, no. 6 (December 2016): 3523–36. http://dx.doi.org/10.1109/tnet.2016.2536479.
Full textTerrovitis, Manolis, Nikos Mamoulis, and Panos Kalnis. "Privacy-preserving anonymization of set-valued data." Proceedings of the VLDB Endowment 1, no. 1 (August 2008): 115–25. http://dx.doi.org/10.14778/1453856.1453874.
Full textKohlmayer, Florian, Fabian Prasser, Claudia Eckert, and Klaus A. Kuhn. "A flexible approach to distributed data anonymization." Journal of Biomedical Informatics 50 (August 2014): 62–76. http://dx.doi.org/10.1016/j.jbi.2013.12.002.
Full textMaltz, David A., Jibin Zhan, Gisli Hjalmtysson, Albert Greenberg, Jennifer Rexford, Geoffrey G. Xie, and Hui Zhang. "Structure preserving anonymization of router configuration data." IEEE Journal on Selected Areas in Communications 27, no. 3 (April 2009): 349–58. http://dx.doi.org/10.1109/jsac.2009.090410.
Full text., Mallappa Gurav. "ANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD." International Journal of Research in Engineering and Technology 04, no. 07 (July 25, 2015): 142–46. http://dx.doi.org/10.15623/ijret.2015.0407021.
Full textLoukides, Grigorios, Aris Gkoulalas-Divanis, and Jianhua Shao. "Efficient and flexible anonymization of transaction data." Knowledge and Information Systems 36, no. 1 (September 9, 2012): 153–210. http://dx.doi.org/10.1007/s10115-012-0544-3.
Full textLi, Jiuyong, Jixue Liu, Muzammil Baig, and Raymond Chi-Wing Wong. "Information based data anonymization for classification utility." Data & Knowledge Engineering 70, no. 12 (December 2011): 1030–45. http://dx.doi.org/10.1016/j.datak.2011.07.001.
Full textMarrón, David González, Verónica Paola Corona Ramírez, Angélica Enciso González, Alejandro Márquez Callejas, and Iridian Sandivel Pérez Hernández. "Development of an application to anonymize data to be shared in the cloud." South Florida Journal of Development 3, no. 4 (August 16, 2022): 5310–18. http://dx.doi.org/10.46932/sfjdv3n4-097.
Full textMarrón, David González, Verónica Paola Corona Ramírez, Angélica Enciso González, Alejandro Márquez Callejas, and Iridian Sandivel Pérez Hernández. "Development of an application to anonymize data to be shared in the cloud." South Florida Journal of Development 3, no. 4 (July 21, 2022): 4696–703. http://dx.doi.org/10.46932/sfjdv3n4-047.
Full textBazai, Sibghat Ullah, Julian Jang-Jaccard, and Hooman Alavizadeh. "Scalable, High-Performance, and Generalized Subtree Data Anonymization Approach for Apache Spark." Electronics 10, no. 5 (March 3, 2021): 589. http://dx.doi.org/10.3390/electronics10050589.
Full textPravin N. Kathavate, Mr, and Dr J. Amudhavel. "Route Map of Privacy Preservation to IOT." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 825. http://dx.doi.org/10.14419/ijet.v7i2.7.11076.
Full textFahad Ahamd. "Preservation of Privacy of Big Data Using Efficient Anonymization Technique." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 4 (December 31, 2019): 14–22. http://dx.doi.org/10.54692/lgurjcsit.2019.030488.
Full textDr. Muhammad Rizwan. "Preservation of Privacy of Big Data Using Efficient Anonymization Technique." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 3 (September 25, 2020): 1–11. http://dx.doi.org/10.54692/lgurjcsit.2020.040399.
Full textLiu, Xiangwen, Xia Feng, and Yuquan Zhu. "Transactional Data Anonymization for Privacy and Information Preservation via Disassociation and Local Suppression." Symmetry 14, no. 3 (February 25, 2022): 472. http://dx.doi.org/10.3390/sym14030472.
Full text