2015
DOI: 10.48550/arxiv.1512.07158
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Feature Selection for Classification under Anonymity Constraint

Abstract: Over the last decade, proliferation of various online platforms and their increasing adoption by billions of users have heightened the privacy risk of a user enormously. In fact, security researchers have shown that sparse microdata containing information about online activities of a user although anonymous, can still be used to disclose the identity of the user by cross-referencing the data with other data sources. To preserve the privacy of a user, in existing works several methods (k-anonymity, ℓ-diversity,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 49 publications
(67 reference statements)
0
3
0
Order By: Relevance
“…A mathematical formulation of k-anonymity as an optimization problem allows us to gauge how much utility is lost in any practical algorithms we devise compared to a theoretical optimum. A similar approach has been taken by Zhang et al [Zhang et al, 2015] where a formal optimization problem is dened and k-anonymity by containment is considered the constraint. They dened containment as a subset S of the feature space that satises k-anonymity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A mathematical formulation of k-anonymity as an optimization problem allows us to gauge how much utility is lost in any practical algorithms we devise compared to a theoretical optimum. A similar approach has been taken by Zhang et al [Zhang et al, 2015] where a formal optimization problem is dened and k-anonymity by containment is considered the constraint. They dened containment as a subset S of the feature space that satises k-anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…In such a scenario, the record linkage cannot be fruitfully applied if each source shares dierentially private records. The truthfulness characteristic and the fact that the model was recommended in dierent privacy legislation and guidelines (such as HIPAA [U.S. Department of Health & Human Services, 2015] and FIPPA [Information and Privacy Commissioner of Ontario, 2016]) contributed to the wide adoption of k-anonymity and multiple algorithms (e.g., [Bayardo and Agrawal, 2005, Byun et al, 2007, Doka et al, 2015, El Emam and Dankar, 2008, Lee et al, 2017, Zhang et al, 2015) have been devised for application of the technique to privacy-sensitive dataset prior to release.…”
Section: Introductionmentioning
confidence: 99%
“…[15,23,32] present approaches for the name disambiguation task on anonymized graphs and they only leverage graph topological features due to the privacy concerns. In addition, [31] solves name entity disambiguation problem as the privacy-preserving classification task such that the anonymized dataset satisfies non-disclosure requirements, at the same time it achieves high disambiguation performance.…”
Section: Related Workmentioning
confidence: 99%