A WordNet-based semantic similarity measurement combining edge-counting and information content theory
JB Gao, BW Zhang, XH Chen - Engineering Applications of Artificial …, 2015 - Elsevier
Semantic similarity measuring between words can be applied to many applications, such as
Artificial Intelligence, Information Processing, Medical Care and Linguistics. In this paper, we …
Artificial Intelligence, Information Processing, Medical Care and Linguistics. In this paper, we …
[图书][B] Database anonymization: privacy models, data utility, and microaggregation-based inter-model connections
The current social and economic context increasingly demands open data to improve
scientific research and decision making. However, when published data refer to individual …
scientific research and decision making. However, when published data refer to individual …
C‐sanitized: A privacy model for document redaction and sanitization
Vast amounts of information are daily exchanged and/or released. The sensitive nature of
much of this information creates a serious privacy threat when documents are uncontrollably …
much of this information creates a serious privacy threat when documents are uncontrollably …
[HTML][HTML] HESML: A scalable ontology-based semantic similarity measures library with a set of reproducible experiments and a replication dataset
This work is a detailed companion reproducibility paper of the methods and experiments
proposed by Lastra-Díaz and García-Serrano in (2015, 2016)[56–58], which introduces the …
proposed by Lastra-Díaz and García-Serrano in (2015, 2016)[56–58], which introduces the …
Utility-preserving privacy protection of nominal data sets via semantic rank swapping
Personal data are of great interest for research but, at the same time, they pose a serious
privacy risk. Therefore, appropriate data protection measures should be undertaken by the …
privacy risk. Therefore, appropriate data protection measures should be undertaken by the …
Data privacy
V Torra, G Navarro‐Arribas - Wiley Interdisciplinary Reviews …, 2014 - Wiley Online Library
Data privacy studies methods, tools, and theory to avoid the disclosure of sensitive
information. Its origin is in statistics with the goal to ensure the confidentiality of data …
information. Its origin is in statistics with the goal to ensure the confidentiality of data …
[图书][B] A Guide to Data Privacy
V Torra - 2022 - Springer
Data privacy is now a hot topic. Big data have increased its importance. Nevertheless,
computational methods for data privacy have been studied and developed since the 70s, at …
computational methods for data privacy have been studied and developed since the 70s, at …
An information theoretic approach to improve semantic similarity assessments across multiple ontologies
Semantic similarity has become, in recent years, the backbone of numerous knowledge-
based applications dealing with textual data. From the different methods and paradigms …
based applications dealing with textual data. From the different methods and paradigms …
A semantic framework for noise addition with nominal data
Noise addition is a data distortion technique widely used in data intensive applications. For
example, in machine learning tasks it helps to reduce overfitting, whereas in data privacy …
example, in machine learning tasks it helps to reduce overfitting, whereas in data privacy …
Constructing plausible innocuous pseudo queries to protect user query intention
Users of web search engines are increasingly worried that their query activities may expose
what topics they are interested in, and in turn, compromise their privacy. It would be …
what topics they are interested in, and in turn, compromise their privacy. It would be …