Sciweavers

126 search results - page 4 / 26
» Efficient Anonymizations with Enhanced Utility
Sort
View
ICDE
2010
IEEE
359views Database» more  ICDE 2010»
14 years 7 months ago
Policy-Aware Sender Anonymity in Location Based Services
Sender anonymity in location-based services (LBS) attempts to hide the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. &...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
ICDE
2010
IEEE
194views Database» more  ICDE 2010»
14 years 7 months ago
XColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Ting Wang, Ling Liu
ICCV
2007
IEEE
14 years 9 months ago
Multiscale Edge Detection and Fiber Enhancement Using Differences of Oriented Means
We present an algorithm for edge detection suitable for both natural as well as noisy images. Our method is based on efficient multiscale utilization of elongated filters measurin...
Meirav Galun, Ronen Basri, Achi Brandt
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 7 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
ICDE
2008
IEEE
219views Database» more  ICDE 2008»
14 years 9 months ago
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. According to the k-anonymity principle, each release of data must be such th...
Osman Abul, Francesco Bonchi, Mirco Nanni