2015 International Conference on Applied Research in Computer Science and Engineering (ICAR) 2015
DOI: 10.1109/arcse.2015.7338148
|View full text |Cite
|
Sign up to set email alerts
|

Towards internal privacy and flexible K-anonymity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Different techniques have been developed to protect data and model privacy during the training and in the subsequent inference phase. Anonymisation techniques [e.g., K-anonymity (Hellani et al, 2015 )] were among the first approaches developed to ensure privacy in model training. Meanwhile, there have been outstanding breakthroughs in the area of privacy attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Different techniques have been developed to protect data and model privacy during the training and in the subsequent inference phase. Anonymisation techniques [e.g., K-anonymity (Hellani et al, 2015 )] were among the first approaches developed to ensure privacy in model training. Meanwhile, there have been outstanding breakthroughs in the area of privacy attacks.…”
Section: Related Workmentioning
confidence: 99%
“…A constrained version of k -Anonymity was later proposed by Miller et al [ 14 ] and refined by Campan et al [ 15 ] with the p -Sensitive k -Anonymity model, which limits the amount of allowed generalization when masking microdata. Recently, new extensions focusing on flexible k -Anonymity were proposed in [ 16 , 17 ] to enable the deployment of k -Anonymity to other application scenarios by defining a semantic ontology to generate suitable k -blocks of data.…”
Section: Background and Related Workmentioning
confidence: 99%