• No results found

sensitive attribute

Improved Estimation of Rare Sensitive Attribute in a Stratified Sampling Using Poisson Distribution

Improved Estimation of Rare Sensitive Attribute in a Stratified Sampling Using Poisson Distribution

... rare sensitive attribute under two different situations are ...unrelated attribute is known and in unknown case, depending on the probability of selecting a ...

11

Sensitive Attribute Discrimination Prevention in Data Mining

Sensitive Attribute Discrimination Prevention in Data Mining

... In the year 2008, P Pedreschi et al, Discrimination prevention technique in [15] consists of inducing a classifier like Naive Bayes in which classification is done without any sensitive attribute. In this ...

6

Nimble randomization device for estimating a rare sensitive attribute using Poisson distribution

Nimble randomization device for estimating a rare sensitive attribute using Poisson distribution

... Abstract. This paper addresses the problem of estimating the mean of the number of persons possessing a rare sensitive attribute utilizing the Poisson distribution in survey sampling. Properties of the ...

8

On the Use of Randomization Device for Estimating the Proportion and Truthful Reporting of a Qualitative Sensitive Attribute

On the Use of Randomization Device for Estimating the Proportion and Truthful Reporting of a Qualitative Sensitive Attribute

... The randomized response technique is a procedure for collecting the information on sensitive characteristics without exposing the identity of the respondent. It was first introduced by Warner (1965) as an ...

12

PERSONALIZED PRIVACY PRESERVING USING SENSITIVE ATTRIBUTE GENERALIZATION

PERSONALIZED PRIVACY PRESERVING USING SENSITIVE ATTRIBUTE GENERALIZATION

... In the paper [2] author introduces a new notion of privacy called as l-diversity. As k- anonymity protects the microdata released table against identity disclosure, it is insufficient to provide attribute ...

10

A Methodology for Sensitive Attribute Discrimination Prevention in Data Mining

A Methodology for Sensitive Attribute Discrimination Prevention in Data Mining

... Classification is the task of generalizing known structures applies to new data. Classification is supervised learning. For example, classes are used to represent that a customer defaults on a loan decisions like „Yes‟ ...

6

Limiting Disclosure of Sensitive Attribute Values: An Active Approach

Limiting Disclosure of Sensitive Attribute Values: An Active Approach

... any attribute values in the ring from ...the attribute A j−1 ∈ A P U will be re- stricted for the attribute A j ∈ A P R with respect to the inference chain P i −→ ∗ P j , 1 ≤ i = j + 1 ≤ m ...

7

Efficient Personalized Privacy Preservation Using Anonymization

Efficient Personalized Privacy Preservation Using Anonymization

... Abstract — The k-anonymity privacy for publishing micro data requires that each equivalence class contains at least k records. Many authors have studied that k- anonymity cannot prevent attribute disclosure. The ...

5

Privacy Preserving Data Mining Using Additive Perturbation on Relational Streaming Data

Privacy Preserving Data Mining Using Additive Perturbation on Relational Streaming Data

... relational attribute data values. This attribute data values are sensitive to the individual data ...original sensitive attribute value are ...

17

S-KACA Anonymity Privacy Protection Based on Clustering Algorithm

S-KACA Anonymity Privacy Protection Based on Clustering Algorithm

... different sensitive information, so it can not protect the sensitive attribute more ...of sensitive privacy degree 𝑥 𝑖 [10], whose value is between 0 ...

7

A Privacy Measure for Data Disclosure to Publish Micro Data using (N,T)   Closeness

A Privacy Measure for Data Disclosure to Publish Micro Data using (N,T) Closeness

... a sensitive attribute in each equivalence class has at least l “well represented” ...a sensitive attribute in any equivalence class is close to the distribution of the attribute in the ...

7

Research of Data Publishing Based on Micro aggregation

Research of Data Publishing Based on Micro aggregation

... different sensitive attribute ...that sensitive attribute in the same equivalence group occurs should be smaller than parameter ...the sensitive attribute, which often has cannot ...

5

Path-Specific Counterfactual Fairness

Path-Specific Counterfactual Fairness

... We consider the problem of learning fair decision systems from data in which a sensitive attribute might affect the de- cision along both fair and unfair pathways. We introduce a counterfactual approach to ...

8

1.
													An adequate amalgamated approach for anonymization

1. An adequate amalgamated approach for anonymization

... of sensitive attribute by assigning appropriate ...confidential attribute to incur the ...for sensitive attribute and the process of k-anonymization only for sensitive ...

5

Survey on Anonymization Technique for Privacy Preserving Data Mining (PPDM)

Survey on Anonymization Technique for Privacy Preserving Data Mining (PPDM)

... 1- sensitive 3-anonymity ...for sensitive attribute If the first record would have a different value for income (such as 40,000) then both groups would have two different illnesses and two different ...

8

Anonymization on Refining Partition: Same Privacy, More Utility

Anonymization on Refining Partition: Same Privacy, More Utility

... between sensitive attribute (SA) and non-sensitive attributes(NSAs) caused by anonymization methods (such as generalization, anatomy, slicing and randomiza- tion, ...

24

Survey on Anonymization in Privacy Preserving Data Mining

Survey on Anonymization in Privacy Preserving Data Mining

... distributes sensitive attribute values in a table such that it satisfies l-diversity and helps to prevent the attribute disclosure problem ...

6

Randomized Additive Data Perturbation and          Reconstruction Technique to Approximate Distribution of Original Information in PPDM

Randomized Additive Data Perturbation and Reconstruction Technique to Approximate Distribution of Original Information in PPDM

... the attribute length as sensitive attribute for analysis ...perturbed sensitive information because the distribution of original data can be ...

6

Sensitive data : the data, which is an attribute AD, which an

Sensitive data : the data, which is an attribute AD, which an

... This work carried on de-facto dataset for privacy evaluation named US Adult dataset , provided from UCI machine learning repository, which is highly cited by research community. It's best known as Census dataset, which ...

5

Feasibility of End To End Encryption using Attribute Based Encryption in Health Care

Feasibility of End To End Encryption using Attribute Based Encryption in Health Care

... Figure 9 lists the size of the different created files. The size of the en- crypted data itself is not listed, as this is the same for each implementation. The most outstanding difference is in the keys size for the ...

59

Show all 9940 documents...

Related subjects