Privacy and artificial intelligence
J Curzon, TA Kosa, R Akalu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Artificial intelligence is a rapidly developing field of research with many practical
applications. Congruent to advances in technologies that enable big data, deep learning …
applications. Congruent to advances in technologies that enable big data, deep learning …
Exploring the Existing and Unknown Side Effects of Privacy Preserving Data Mining Algorithms
HB Sadashiva Reddy - 2022 - nsuworks.nova.edu
The data mining sanitization process involves converting the data by masking the sensitive
data and then releasing it to public domain. During the sanitization process, side effects …
data and then releasing it to public domain. During the sanitization process, side effects …
[PDF][PDF] Privacy preserving data mining: techniques and algorithms
There is incredible volume of data that is generated at exponential rate by various
organizations such as hospitals, insurance companies, banks, stock market etc. It is done by …
organizations such as hospitals, insurance companies, banks, stock market etc. It is done by …
On the role of data anonymization in machine learning privacy
N Senavirathne, V Torra - … on trust, security and privacy in …, 2020 - ieeexplore.ieee.org
Data anonymization irrecoverably transforms the raw data into a protected version by
eliminating direct identifiers and removing sufficient details from indirect identifiers in order …
eliminating direct identifiers and removing sufficient details from indirect identifiers in order …
Text Sanitization Beyond Specific Domains: Zero-Shot Redaction & Substitution with Large Language Models
F Albanese, D Ciolek, N D'Ippolito - arXiv preprint arXiv:2311.10785, 2023 - arxiv.org
In the context of information systems, text sanitization techniques are used to identify and
remove sensitive data to comply with security and regulatory requirements. Even though …
remove sensitive data to comply with security and regulatory requirements. Even though …
Comparison of machine learning models applied on anonymized data with different techniques
Anonymization techniques based on obfuscating the quasi-identifiers by means of value
generalization hierarchies are widely used to achieve preset levels of privacy. To prevent …
generalization hierarchies are widely used to achieve preset levels of privacy. To prevent …
Do not disturb? classifier behavior on perturbed datasets
Exponential trends in data generation are presenting today's organizations, economies and
governments with challenges never encountered before, especially in the field of privacy …
governments with challenges never encountered before, especially in the field of privacy …
Energy cost and accuracy impact of k-anonymity
A Oprescu, S Misdorp… - … Conference on ICT for …, 2022 - ieeexplore.ieee.org
European Union has aggregated the current societal concerns into two seemingly
orthogonal directions: the Green Deal and the GDPR. In this paper, we begin to analyse …
orthogonal directions: the Green Deal and the GDPR. In this paper, we begin to analyse …
Exploring the Impact of K-Anonymisation on the Energy Efficiency of Machine Learning Algorithms
V Zemanek, Y Hu, P De Reus… - … Conference on ICT …, 2024 - ieeexplore.ieee.org
With the increased use of Artificial Intelligence (AI), concerns about AI's energy consumption
are increasing as well. This paper investigates the impact of k-anonymisation and dataset …
are increasing as well. This paper investigates the impact of k-anonymisation and dataset …
An analysis of different notions of effectiveness in k-anonymity
T Šarčević, D Molnar, R Mayer - Privacy in Statistical Databases: UNESCO …, 2020 - Springer
Abstract k-anonymity is an approach for enabling privacy-preserving data publishing of
personal, sensitive data. As a result of this anonymisation process, the utility of the sanitised …
personal, sensitive data. As a result of this anonymisation process, the utility of the sanitised …