-
1
المؤلفون: Kwatra, Saloni, Monreale, Anna, Naretto, Francesca
المصدر: Proceedings of the International Conference on Security and Cryptography International Conference on Security and Cryptography. :850-857
مصطلحات موضوعية: Data Reconstruction Attack, Federated Learning, Generative Networks, k-anonymity, Membership Inference Attack, Principal Component Analysis
وصف الملف: electronic
-
2
المؤلفون: Bozorgpanah, Aso, Torra, Vicenç
المصدر: Progress in Artificial Intelligence. 13:31-50
مصطلحات موضوعية: Data privacy, Explainability, eXplainable artificial intelligence, Irregularity, k-anonymity, Local differential privacy, Machine learning, Microaggregation, Noise addition
وصف الملف: electronic
-
3Academic Journal
المؤلفون: RUAN Huafeng, LI Rui, LUO Kailun
المصدر: 网络与信息安全学报, Vol 10, Pp 175-187 (2024)
مصطلحات موضوعية: vertical partitioning, privacy protection, k-anonymity, machine learning, satisfiability problem, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
4Dissertation/ Thesis
المؤلفون: Soria Comas, Jorge
المساهمون: University/Department: Universitat Rovira i Virgili. Departament d'Enginyeria Informàtica i Matemàtiques
Thesis Advisors: Domingo-Ferrer, Josep, 1965-
المصدر: T.1018-2013
TDX (Tesis Doctorals en Xarxa)مصطلحات موضوعية: Differential privacy, K-anonymity, data privacy
وصف الملف: application/pdf
URL الوصول: http://hdl.handle.net/10803/119650
-
5
المؤلفون: Torra, Vicenç, Navarro-Arribas, Guillermo
المصدر: International Journal of Information Security. 22(6):2015-2024
مصطلحات موضوعية: Attribute disclosure, Data protection, k-anonymity, Masking methods, Microaggregation, Reidentification
وصف الملف: electronic
-
6
المؤلفون: Kwatra, Saloni, 1997
المساهمون: Torra, Vicenç, Professor, Gambs, Sébastian, Professor
المصدر: UMINF.
مصطلحات موضوعية: Privacy, Data Reconstruction Attacks, k-anonymity, Differential Privacy, Federated Learning, Decision Trees, Principal Component Analysis
وصف الملف: electronic
-
7
المؤلفون: Garg, Sonakshi, 1998, Torra, Vicenç
المصدر: Computers & security (Print). 144
مصطلحات موضوعية: k-anonymity, Differential Privacy Manifolds, Fréchet Mean clustering
وصف الملف: electronic
-
8Academic Journal
المؤلفون: Widodo Widodo, Muhammad Ficky Duskarnaen, Murien Nugraheni
المصدر: JuTISI (Jurnal Teknik Informatika dan Sistem Informasi), Vol 10, Iss 2, Pp 294 – 302-294 – 302 (2024)
مصطلحات موضوعية: aggregative of sensitive value, k-anonymity, privacy, simple distribution of sensitive values, Electronic computers. Computer science, QA75.5-76.95, Technology
وصف الملف: electronic resource
-
9Academic Journal
المؤلفون: Himani Saini, Gopal Singh, Amrinder Kaur, Sunil Saini, Niyaz Ahmad Wani, Vikram Chopra, Zahid Akhtar, Shahid Ahmad Bhat
المصدر: IEEE Access, Vol 12, Pp 195943-195959 (2024)
مصطلحات موضوعية: Cloud network security, data privacy, hybrid optimization, k-anonymity, machine learning, trust-based mechanisms, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
10Academic Journal
المؤلفون: C. N. Sowmyarani, L. G. Namya, G. K. Nidhi, P. Ramakanth Kumar
المصدر: IEEE Access, Vol 12, Pp 79861-79874 (2024)
مصطلحات موضوعية: Clustering, k-anonymity, data privacy, privacy-preserving data publishing, genetic algorithm, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
11Academic Journal
المؤلفون: Yavuz Canbay
المصدر: IEEE Access, Vol 12, Pp 94197-94204 (2024)
مصطلحات موضوعية: Graph coloring, k-anonymity, np-hardness, proof, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
12Dissertation/ Thesis
-
13Academic Journal
المؤلفون: Nanlan Jiang, Yinan Zhai, Yujun Wang, Xuesong Yin, Sai Yang, Pingping Xu
المصدر: Sensors, Vol 24, Iss 18, p 6153 (2024)
مصطلحات موضوعية: Internet of Things, edge computing, location privacy, K-anonymity, cluster, Chemical technology, TP1-1185
وصف الملف: electronic resource
-
14Conference
المؤلفون: Memarian, Saeideh, Oprescu, Andreea M., Alexandre, Betsaida, Miró Amarante, Gloria, Romero Ternero, María del Carmen, Varela Vaca, Ángel Jesús (Coordinador), Ceballos Guerrero, Rafael (Coordinador), Reina Quintero, Antonia María (Coordinador)
المساهمون: Varela Vaca, Ángel Jesús, Ceballos Guerrero, Rafael, Reina Quintero, Antonia María, Universidad de Sevilla. Departamento de Tecnología Electrónica
مصطلحات موضوعية: Privacy preserving, K-anonymity, L-diversity, Tcloseness, Fuzzy clustering, Grey Wolf Optimizer (GWO), Graphbased GWO
Relation: Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (2024), pp. 414-416.; Sevilla; https://idus.us.es/handle//11441/160769
-
15Academic Journal
المؤلفون: Abdul Majeed
المصدر: Journal of Cybersecurity and Privacy, Vol 3, Iss 3, Pp 638-661 (2023)
مصطلحات موضوعية: anonymization, personal data, k-anonymity, ℓ-diversity, t-closeness, differential privacy, Technology (General), T1-995
وصف الملف: electronic resource
-
16Academic Journal
المصدر: 网络与信息安全学报, Vol 9, Iss 4, Pp 64-73 (2023)
مصطلحات موضوعية: k-anonymity model, privacy preservation, data compression storage, huffman coding, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
17Academic Journal
المصدر: 网络与信息安全学报, Vol 9, Iss 3, Pp 60-72 (2023)
مصطلحات موضوعية: location-based service, location privacy preservation, k-anonymity, convex hull, anchor, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
18Academic Journal
المؤلفون: Atsushi Waseda, Ryo Nojima, Lihua Wang
المصدر: Applied Sciences, Vol 14, Iss 17, p 7625 (2024)
مصطلحات موضوعية: privacy preservation, (random) decision tree, k-anonymity, ℓ-diversity, differential privacy, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
وصف الملف: electronic resource
-
19Academic Journal
المؤلفون: Faruq, Md. Omar, Walid, Md. Abul Ala, Baowaly, Mrinal Kanti, Devnath, Maloy Kumar, Ejaz, Md. Sabbir, Barman, Pronob Kumar, Sattar, A H M Sarowar
المساهمون: This is self funding research.
المصدر: Bulletin of Electrical Engineering and Informatics; Vol 13, No 4: August 2024; 2677-2686 ; 2302-9285 ; 2089-3191 ; 10.11591/eei.v13i4
مصطلحات موضوعية: computer and informatics engineering, Security, Composition attacks, k-anonymity, Knowledge domain, l-diversity, Unauthorized access
وصف الملف: application/pdf
-
20Academic Journal
المؤلفون: Xingmin Lu, Wei Song
المصدر: Applied Sciences, Vol 14, Iss 8, p 3230 (2024)
مصطلحات موضوعية: multi-source ( k,d )-anonymity, multi-source ( k,l,d )-diversity, privacy, IoV, k -anonymity, aggregated dataset, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Relation: https://www.mdpi.com/2076-3417/14/8/3230; https://doaj.org/toc/2076-3417; https://doaj.org/article/d28e59f616964e6794a8808e817d5990