2017
DOI: 10.1016/j.is.2017.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving record linkage in the presence of missing values

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 33 publications
(49 reference statements)
0
7
0
Order By: Relevance
“…If the similarity between two vertices is at least a minimum threshold s t an edge is created between the corresponding vertices (as shown in Figure 4 for s t = 0.75 and described in lines 14 and 15 in Algorithm 1). (5) The optimal one-to-one mapping (as defined in Section 2) is applied in every iteration i (with 1 ≤ i ≤ p − 1) after edges between the records from party P i+1 (singletons) and clusters of records from parties P 1 to P i have been added. This optimal mapping connects only two highly matching vertices, complying with the assumption of deduplication.…”
Section: Definition 33 (Average Similarity) the Average Similarity mentioning
confidence: 99%
“…If the similarity between two vertices is at least a minimum threshold s t an edge is created between the corresponding vertices (as shown in Figure 4 for s t = 0.75 and described in lines 14 and 15 in Algorithm 1). (5) The optimal one-to-one mapping (as defined in Section 2) is applied in every iteration i (with 1 ≤ i ≤ p − 1) after edges between the records from party P i+1 (singletons) and clusters of records from parties P 1 to P i have been added. This optimal mapping connects only two highly matching vertices, complying with the assumption of deduplication.…”
Section: Definition 33 (Average Similarity) the Average Similarity mentioning
confidence: 99%
“…To rid this vulnerability of these anonymization models, in [15], the authors propose an anonymization model for filling in missing-values with using a lazy decision-tree imputation algorithm for data that is horizontally partitioned between two groups. In [7], an anonymization model for missing-value datasets is also proposed. To achieve privacy preservation constraints, this model imputes the similarity measure between every missing-value and the value of the corresponding field in any of the possible matching tuples from another dataset.…”
Section: Introductionmentioning
confidence: 99%
“…In brief, the anonymization models are proposed by [7,15], they can address privacy violation issues in missingvalue datasets. In [15], the lazy decision-tree algorithm is applied.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A huge quantity of data from diverse sources is collected and processed, the IoT process may have an important impact on the privacy of users' [82]. In addition, focusing the extending trend on gathering extra personalized and individual data in IoT, there exists a lot of exertions concerning the impact on privacy of the individuals' from an authorized perspective [83]. The data managing or processing of IoT is significantly impacted by position information and consecutively affects its position privacy [84].…”
Section: Introductionmentioning
confidence: 99%