Academic literature on the topic 'K-Anonymisation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'K-Anonymisation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "K-Anonymisation"
Loukides, Grigorios, and Jian-Hua Shao. "An Efficient Clustering Algorithm for k-Anonymisation." Journal of Computer Science and Technology 23, no. 2 (2008): 188–202. http://dx.doi.org/10.1007/s11390-008-9121-3.
Full textNatwichai, Juggapong, Xue Li, and Asanee Kawtrkul. "Incremental processing and indexing for (k, e)-anonymisation." International Journal of Information and Computer Security 5, no. 3 (2013): 151. http://dx.doi.org/10.1504/ijics.2013.055836.
Full textStark, Konrad, Johann Eder, and Kurt Zatloukal. "Achieving k-anonymity in DataMarts used for gene expressions exploitation." Journal of Integrative Bioinformatics 4, no. 1 (2007): 132–44. http://dx.doi.org/10.1515/jib-2007-58.
Full textde Haro-Olmo, Francisco José, Ángel Jesús Varela-Vaca, and José Antonio Álvarez-Bermejo. "Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review." Sensors 20, no. 24 (2020): 7171. http://dx.doi.org/10.3390/s20247171.
Full textZhang, Yuliang, Tinghuai Ma, Jie Cao, and Meili Tang. "K-anonymisation of social network by vertex and edge modification." International Journal of Embedded Systems 8, no. 2/3 (2016): 206. http://dx.doi.org/10.1504/ijes.2016.076114.
Full textSahil bucha. "Balancing Privacy and Utility: Anonymisation Techniques for E-commerce Logistics Data." International Journal of Engineering Research and Science & Technology 17, no. 2 (2021): 65–75. https://doi.org/10.62643/ijerst.v17n2pp.65-75.
Full textGanabathi, G. Chitra, and P. Uma Maheswari. "Efficient clustering technique for k-anonymisation with aid of optimal KFCM." International Journal of Business Intelligence and Data Mining 15, no. 4 (2019): 430. http://dx.doi.org/10.1504/ijbidm.2019.102809.
Full textSingh, Amardeep, Monika Singh, Divya Bansal, and Sanjeev Sofat. "Optimised K-anonymisation technique to deal with mutual friends and degree attacks." International Journal of Information and Computer Security 14, no. 3/4 (2021): 281. http://dx.doi.org/10.1504/ijics.2021.114706.
Full textSofat, Sanjeev, Divya Bansal, Monika Singh, and Amardeep Singh. "Optimised K-anonymisation technique to deal with mutual friends and degree attacks." International Journal of Information and Computer Security 14, no. 3/4 (2021): 281. http://dx.doi.org/10.1504/ijics.2021.10037248.
Full textYaji, Sharath, and B. Neelima. "Parallel computing for preserving privacy using k-anonymisation algorithms from big data." International Journal of Big Data Intelligence 5, no. 3 (2018): 191. http://dx.doi.org/10.1504/ijbdi.2018.092659.
Full textDissertations / Theses on the topic "K-Anonymisation"
Mauger, Clémence. "Optimisation de l'utilité des données lors d'un processus de k-anonymisation." Electronic Thesis or Diss., Amiens, 2021. http://www.theses.fr/2021AMIE0076.
Full textVerster, Cornelis Thomas. "On supporting K-anonymisation and L-diversity of crime databases with genetic algorithms in a resource constrained environment." Master's thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/20016.
Full textSondeck, Louis-Philippe. "Privacy and utility assessment within statistical data bases." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0023/document.
Full textSondeck, Louis-Philippe. "Privacy and utility assessment within statistical data bases." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0023.
Full textBook chapters on the topic "K-Anonymisation"
Loukides, Grigorios, Achilles Tziatzios, and Jianhua Shao. "Towards Preference-Constrained k-Anonymisation." In Database Systems for Advanced Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04205-8_20.
Full text"Graph Modification Approaches." In Security, Privacy, and Anonymization in Social Networks. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5158-4.ch005.
Full textConference papers on the topic "K-Anonymisation"
Zemanek, Vit, Yixin Hu, Pepijn De Reus, Ana Oprescu, and Ivano Malavolta. "Exploring the Impact of K-Anonymisation on the Energy Efficiency of Machine Learning Algorithms." In 2024 10th International Conference on ICT for Sustainability (ICT4S). IEEE, 2024. https://doi.org/10.1109/ict4s64576.2024.00022.
Full textLoukides, Grigorios, and Jianhua Shao. "Capturing data usefulness and privacy protection in K-anonymisation." In the 2007 ACM symposium. ACM Press, 2007. http://dx.doi.org/10.1145/1244002.1244091.
Full textLoukides, Grigorios, and Jianhua Shao. "Greedy Clustering with Sample-Based Heuristics for K-Anonymisation." In The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007). IEEE, 2007. http://dx.doi.org/10.1109/isdpe.2007.102.
Full textLoukides, Grigorios, and Jianhua Shao. "Towards Balancing Data Usefulness and Privacy Protection in K-Anonymisation." In The Sixth IEEE International Conference on Computer and Information Technology (CIT'06). IEEE, 2006. http://dx.doi.org/10.1109/cit.2006.184.
Full textLoukides, Grigorios, and Jianhua Shao. "Data utility and privacy protection trade-off in k-anonymisation." In the 2008 international workshop. ACM Press, 2008. http://dx.doi.org/10.1145/1379287.1379296.
Full textTripathy, B. K., and Anirban Mitra. "An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks." In 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN). IEEE, 2012. http://dx.doi.org/10.1109/cason.2012.6412390.
Full textde Reus, Pepijn, Ana Oprescu, and Koen van Elsen. "Energy Cost and Machine Learning Accuracy Impact of k-Anonymisation and Synthetic Data Techniques." In 2023 International Conference on ICT for Sustainability (ICT4S). IEEE, 2023. http://dx.doi.org/10.1109/ict4s58814.2023.00015.
Full text