2020
DOI: 10.1016/j.ins.2019.09.035
|View full text |Cite
|
Sign up to set email alerts
|

Effective privacy preserving data publishing by vectorization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 56 publications
(19 citation statements)
references
References 10 publications
0
18
0
Order By: Relevance
“…As a general framework, it can be apply to predictive analytics for other purposes in a wide variety of domains (e.g., prediction of box office [15] or stock market [18]). We also consider to extend our framework as to deal with novel features of big data such as performance, privacy, and flexible paradigms (e.g., [2,5,6,9]).…”
Section: Discussionmentioning
confidence: 99%
“…As a general framework, it can be apply to predictive analytics for other purposes in a wide variety of domains (e.g., prediction of box office [15] or stock market [18]). We also consider to extend our framework as to deal with novel features of big data such as performance, privacy, and flexible paradigms (e.g., [2,5,6,9]).…”
Section: Discussionmentioning
confidence: 99%
“…Vid2speech is also an end-to-end model based on CNN to generate understandable speech signals in a speaker’s silent video. All three presented models are deep learning architectures that have made significant progress in the lip-reading field, indicating that AI lip readers can be used to analyze not only in simple speech readings but also users’ real-time thinking [ 65 ] and information security areas [ 96 ]. While the previously mentioned traditional methods were not universal, deep learning model including LipNet, Lip2Audspec and Vid2speech enabled deeper feature extraction through a general process of extracting lip parts for the image or each frame of the video and processing data through the neural network [ 94 ].…”
Section: Deep Learning Based Voice Recognitionmentioning
confidence: 99%
“…As shown in Fig. 2(b), the attacker knows that target user A has visited location points (1, 3), (2,5) and (4,7). Since only O 3 can contain these three location points in the published anonymous trajectory data set, the attacker can determine that O 3 is A.…”
Section: B Trajectory Attack Modelmentioning
confidence: 99%
“…While, analyzing trajectories of vehicles in a city may help government optimize the traffic management systems. However, publishing trajectories can also cause serious threats to the personal privacy [1], [2]. Spatio-temporal information [3] contained in trajectories may reveal individuals' personal information, such as, living habits, health conditions, social customs, work and home addresses, etc.…”
Section: Introductionmentioning
confidence: 99%