Sciweavers

2958 search results - page 5 / 592
» Using Anonymized Data for Classification
Sort
View
NDSS
2008
IEEE
14 years 4 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...

Publication
334views
15 years 9 months ago
ANONAGGREGATE: Anonymizing Data Using Sequential Aggregation
We propose a methodology for anonymization of records by aggregating sequential records. This methodology is applied to real valued, binary, nominal and ordinal data. We propose tw...
Sanjay Bapna, Abirami Radhakrishnan, Aryya Gangopa...
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 9 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 9 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
KDD
2006
ACM
132views Data Mining» more  KDD 2006»
14 years 10 months ago
Utility-based anonymization using local recoding
Privacy becomes a more and more serious concern in applications involving microdata. Recently, efficient anonymization has attracted much research work. Most of the previous metho...
Jian Xu, Wei Wang 0009, Jian Pei, Xiaoyuan Wang, B...