Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing"
written by Abou-el-ela Abdou Hussien, Nermin Hamza, Hesham A. Hefny,
published by Journal of Information Security, Vol.4 No.2, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Large language models as decision aids in neuro-oncology: a review of shared decision-making applications
Journal of Cancer …, 2024
[2] Score, Arrange and Cluster: A novel clustering-based technique for Privacy Preserving Data Publishing
IEEE Access, 2024
[3] DP-Select: Improving Utility and Privacy in Tabular Data Synthesis with Differentially Private Generative Adversarial Networks and Differentially Private Selection
2023
[4] An anonymization-based privacy-preserving data collection protocol for digital health data
Frontiers in Public Health, 2023
[5] A survey of privacy risks and mitigation strategies in the Artificial intelligence life cycle
IEEE Access, 2023
[6] Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud
Expert Systems with …, 2022
[7] A Targeted Privacy-Preserving Data Publishing Method Based on Bayesian Network
IEEE Access, 2022
[8] Robustness of k-Anonymization Model in Compliance with General Data Protection Regulation
2022 5th International …, 2022
[9] Utility-Aware Data Anonymization Model for Healthcare Information
2022 IEEE Smartworld, Ubiquitous …, 2022
[10] EHENSIVE ANALYSIS DATA MINING ALGOR
Computer Science (IRJCS), 2022
[11] Contributions à la préservation de la vie privée et de la sécurité des données partagées
2022
[12] Design and Implementation of a privacy-preserving framework for Machine Learning
2021
[13] Differentially Private Data Release for Data Analytics-A Model Review.
Database Systems Journal, 2021
[14] 'Sensitivity context-aware privacypreserving sentiment analysis
Intelligent Manufacturing and …, 2021
[15] Privacy Issues in Big Data and Enhanced Privacy Preservation Model
Indian Journal of Data Mining, 2021
[16] Data mining privacy preserving: Research agenda
2021
[17] Sensitivity Context-Aware PrivacyPreserving Sentiment Analysis
2021
[18] When machine learning meets privacy: A survey and outlook
2021
[19] PETchain: A Blockchain-Based Privacy Enhancing Technology
2021
[20] Certain Inverstigations on Privacy-Preserving Data Mining Using Three-Dimensional Spin Revolution (3DSR) Scheme
2021
[21] A Review of Anonymization for Healthcare Data
2021
[22] Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives
2020
[23] Privacy as a Service: Anonymisation of NetFlow Traces
2019
[24] Analyzing Small Businesses' Adoption of Big Data Security Analytics
2019
[25] Quasi Attribute Utility Enhancement (QAUE)-A Hybrid Method for PPDP
International Journal of Innovative Technology and Exploring Engineering, 2019
[26] Study On Various Privacy-Preserving Data Mining Techniques For Information Extraction
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, 2019
[27] A study on T-Closeness over K-anonymization Technique for Privacy Preserving in Big Data
International Journal of Engineering Research & Technology, 2019
[28] An efficient privacy preserving protocol for dynamic continuous data collection
2019
[29] Extending a re-identification risk-based anonymisation framework and evaluating its impact on data mining classifiers
2019
[30] Survey on Privacy Preserving Data Mining for Information Extraction
Conference Paper, 2019
[31] Data Transformation Technique for Preserving Privacy in Data
International Journal of Computer Sciences …, 2018
[32] On Minimality Attack for Privacy-Preserving Data Publishing
2018
[33] Anonymisation de données par généralisation. Méthode avec guidage
2018
[34] A New Privacy Preserving Data Publishing Technique Conserving Accuracy of Classification on Anonymized Data
2018
[35] FCMRSA: Privacy Preservation with Clustering and Cryptographic Technique in Data Mining
2018
[36] Anonymisation de données par généralisation
A guided method, Ingénierie des Systèmes d’Information, 2018
[37] Restricted Sensitive Attributes-based Sequential Anonymization (RSA-SA) approach for privacy-preserving data stream publishing
Knowledge-Based Systems, 2018
[38] Enhanced additive noise approach for privacy-preserving tabular data publishing
2017
[39] Classification and evaluation of Privacy Preserving Data Mining: A review
2017
[40] Anonymization based privacy preservation over cloud data using incremental clustering and map reduce approach on big data
2017
[41] On Minimality Attack in Privacy Preserving Data Publishing
2017
[42] Hybrid Approach with Zero Mean Distribution and Randomization for Privacy Preservation Technique
2017
[43] Share a pie?: Privacy-Preserving Knowledge Base Export through Count-min Sketches
CODASPY 2017 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017
[44] A Study on k-anonymity, l-diversity, and t-closeness Techniques
2017
[45] Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment
Information Systems, 2017
[46] Privacy-preserving tabular data publishing: a comprehensive evaluation from web to cloud
Computers & Security, 2017
[47] Attribute based diversity model for privacy preservation
2017
[48] Share a pie? Privacy-Preserving Knowledge Base Export through Count-min Sketches
2017
[49] A Review on Privacy Preserving Data mining
JETIR, 2016
[50] 几种隐私数据挖掘算法研究进展
大众科技, 2016
[51] Protecting Sensitive Knowledge with Effective Privacy Preservation
International Journal of Applied Engineering Research [IJAER], 2016
[52] Data Security: Modified Privacy-Preserving Data Mining Algorithm
2016
[53] Privacy Preserving Data Mining On Published Data in Healthcare: A Survey
2016
[54] PRIVACY PRESERVING DATA MINING TECHNIQUES USING RECENT ALGORITHMS
2016
[55] Challenges on Anonymity, Privacy, and Big Data
2016
[56] Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms
International Journal of Computer Applications, 2016
[57] Clustering Based L-Diversity Anonymity Model for Privacy Preservation of Data Publishing
International Journal of Enhanced Research in Science, Technology & Engineering, 2016
[58] Re-identification attacks—A systematic literature review
International Journal of Information Management, 2016
[59] An improved Ambiguity+anonymization technique with enhanced data utility
2015
[60] Enhanced Privacy Preserving Model for Data Using (α, β, k)-Anonymity Model and Lossy join
2015
[61] Survey on Anonymization in Privacy Preserving Data Mining
International Journal of Innovative and Emerging Research in Engineering, 2015
[62] Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
Journal of Information Security, 2015
[63] An improved Ambiguity+ anonymization technique with enhanced data utility
Information and Knowledge Technology (IKT), 2015 7th Conference on, 2015
[64] The Impact of Anonymization for Automated Essay Scoring
Journal of Educational Measurement, 2015
[65] Enhanced Privacy Preserving Model for Data Using ([alpha],[Beta],[kappa])-Anonymity Model and Lossy join
International Journal of Computer Science and Information Security, 2015
[66] Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications
Computer Networks, 2015
[67] Privacy-Preserving Health Data Collection for Preschool Children
Computational and mathematical methods in medicine, 2013
[68] Ethics of Data Mining: a New Zealand Survey
2013
[69] HENSIVE ANA MINING ALG
[70] A Study on k-anonymity, l-diversity, and t-closeness Techniques of Privacy Preservation Data Publishing
[71] Journal Homepage:-www. journalijar. com
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top