4.6 Article

Privacy-preserving data collection for 1: M dataset

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity

Razaullah Khan et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Article Computer Science, Artificial Intelligence

Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption

Rabeah Noor et al.

SOFT COMPUTING (2019)

Editorial Material Construction & Building Technology

An effective privacy preserving mechanism for 1: M microdata with high utility

Adeel Anjum et al.

SUSTAINABLE CITIES AND SOCIETY (2019)

Article Computer Science, Information Systems

An efficient privacy preserving protocol for dynamic continuous data collection

Haider Sajjad et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Hardware & Architecture

Privacy-preserving raw data collection without a trusted authority for IoT

Yi-Ning Liu et al.

COMPUTER NETWORKS (2019)

Article Telecommunications

Feature Selection Based Correlation Attack on HTTPS Secure Searching

Aaliya Sarfaraz et al.

WIRELESS PERSONAL COMMUNICATIONS (2018)

Article Computer Science, Artificial Intelligence

Anonymizing 1:M microdata with high utility

Qiyuan Gong et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Article Computer Science, Theory & Methods

Privacy-Preserving Data Aggregation in Mobile Phone Sensing

Yuan Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

A Smartphone-based System for Population-scale Anonymized Public Health Data Collection and Intervention

Andrew Clarke et al.

2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS) (2014)

Article Computer Science, Information Systems

Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms

Saif U. R. Malik et al.

IEEE Transactions on Cloud Computing (2013)

Article Computer Science, Information Systems

Extended k-anonymity models against sensitive attribute disclosure

Xiaoxun Sun et al.

COMPUTER COMMUNICATIONS (2011)

Article Computer Science, Information Systems

AnonySense: A system for anonymous opportunistic sensing

Minho Shin et al.

PERVASIVE AND MOBILE COMPUTING (2011)

Article Computer Science, Information Systems

k-Anonymous data collection

Sheng Zhong et al.

INFORMATION SCIENCES (2009)

Article Computer Science, Information Systems

Privacy-preserving Anonymization of Set-valued Data

Manolis Terrovitis et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2008)

Article Computer Science, Artificial Intelligence

Anonymizing classification data for privacy preservation

Benjamin C. M. Fung et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2007)

Article Computer Science, Artificial Intelligence

k-anonymity:: A model for protecting privacy

L Sweeney

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)