2014 IEEE 28th International Conference on Advanced Information Networking and Applications 2014
DOI: 10.1109/aina.2014.20
|View full text |Cite
|
Sign up to set email alerts
|

Graph Anonymization Using Machine Learning

Abstract: Data privacy is a major problem that has to be considered before releasing datasets to the public or even to a partner company that would compute statistics or make a deep analysis of these data. This is insured by performing data anonymization as required by legislation. In this context, many different anonymization techniques have been proposed in the literature. These methods are usually specific to a particular de-anonymization procedure -or attack -one wants to avoid, and to a particular known set of char… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2025
2025

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Anonymization framework inspired from [29]; D is the data to be published, BK is the Background Knowledge; and pD the protected data obtained by the anonymization process, considering the classification made by the expert user. 2 k-anonymity is one of the most used common condition, that consists on making entities undistinguished from at least k − 1 other entities, because they have similar information [43].…”
Section: Figurementioning
confidence: 99%
“…Anonymization framework inspired from [29]; D is the data to be published, BK is the Background Knowledge; and pD the protected data obtained by the anonymization process, considering the classification made by the expert user. 2 k-anonymity is one of the most used common condition, that consists on making entities undistinguished from at least k − 1 other entities, because they have similar information [43].…”
Section: Figurementioning
confidence: 99%