2020
DOI: 10.1016/j.ins.2019.05.053
|View full text |Cite
|
Sign up to set email alerts
|

Efficient privacy preservation of big data for accurate data mining

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
67
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 76 publications
(68 citation statements)
references
References 42 publications
0
67
0
1
Order By: Relevance
“…Newton et al proposed a de-identification approach for face images (named as k − same), which does not need complex cryptographic operations [10]. The proposed method is based on k − anonymity [6,22]. However, k − anonymity tends to reduce accuracy and increase information leak when introduced with high dimensional data [6].…”
Section: Related Workmentioning
confidence: 99%
“…Newton et al proposed a de-identification approach for face images (named as k − same), which does not need complex cryptographic operations [10]. The proposed method is based on k − anonymity [6,22]. However, k − anonymity tends to reduce accuracy and increase information leak when introduced with high dimensional data [6].…”
Section: Related Workmentioning
confidence: 99%
“…The anonymization-based study to protect individual privacy has become popular for the past decade. They conducted [16] a survey of U.S. census summary data to state the privacy risk of individuals.…”
Section: Related Workmentioning
confidence: 99%
“…Such a lack of attention (Song et al, 2019) exposes organizations to information security breaches (Safa et al, 2016;Gordon et al, 2015). To defend themselves, organizations need to invest in information security, which is the protection of the organizational resources including information, hardware, or software (Chamikara et al, 2020;Guttman & Roback, 1995).…”
Section: Introductionmentioning
confidence: 99%