[图书][B] Database anonymization: privacy models, data utility, and microaggregation-based inter-model connections

J Domingo-Ferrer, D Sánchez, J Soria-Comas - 2022 - books.google.com
The current social and economic context increasingly demands open data to improve
scientific research and decision making. However, when published data refer to individual …

Utility-preserving privacy protection of nominal data sets via semantic rank swapping

M Rodriguez-Garcia, M Batet, D Sánchez - Information Fusion, 2019 - Elsevier
Personal data are of great interest for research but, at the same time, they pose a serious
privacy risk. Therefore, appropriate data protection measures should be undertaken by the …

Classification of privacy preserving data mining algorithms: a review

D Gunawan - Jurnal Elektronika dan Telekomunikasi, 2020 - jurnalet.com
Nowadays, data from various sources are gathered and stored in databases. The collection
of the data does not give a significant impact unless the database owner conducts certain …

On the self-adjustment of privacy safeguards for query log streams

D Pàmies-Estrems, J Garcia-Alfaro - Computers & Security, 2023 - Elsevier
Internet-based services process and store numerous search queries around the globe. The
use of web search engines, such as Bing and Google, as well as personal assistants (eg …

A real-time query log protection method for web search engines

D Pamies-Estrems, J Castella-Roca… - IEEE Access, 2020 - ieeexplore.ieee.org
Web search engines (eg, Google, Bing, Qwant, and DuckDuckGo) may process a myriad of
search queries per second. According to Internet Live Stats, Google handles more than two …

A new method for the automatic retrieval of medical cases based on the RadLex ontology

AB Spanier, D Cohen, L Joskowicz - International journal of computer …, 2017 - Springer
Purpose The goal of medical case-based image retrieval (M-CBIR) is to assist radiologists in
the clinical decision-making process by finding medical cases in large archives that most …

Semantic noise: privacy-protection of nominal microdata through uncorrelated noise addition

M Rodriguez-Garcia, M Batet… - 2015 IEEE 27th …, 2015 - ieeexplore.ieee.org
Personal data are of great interest in statistical studies and to provide personalized services,
but its release may impair the privacy of individuals. To protect the privacy, in this paper, we …

Minimizing energy consumption of multiple-processors-core systems with simultaneous task allocation, scheduling and voltage assignment

LF Leung, CY Tsui, WH Ki - ASP-DAC 2004: Asia and South …, 2004 - ieeexplore.ieee.org
In this paper, we tackle the problem of minimizing the energy consumption of multiple-
processors-core system using multiple variable supply voltages. Given a set of tasks and …

An overview of the use of clustering for data privacy

V Torra, G Navarro-Arribas, K Stokes - Unsupervised Learning Algorithms, 2016 - Springer
In this chapter we review some of our results related to the use of clustering in the area of
data privacy. The paper gives a brief overview of data privacy and, more specifically, on data …

[PDF][PDF] Contributions to Lifelogging Protection In Streaming Environments

D Pàmies Estrems - 2020 - core.ac.uk
CONTRIBUTIONS TO LIFELOGGING PROTECTION IN STREAMING ENVIRONMENTS David
Pàmies Estrems Page 1 CONTRIBUTIONS TO LIFELOGGING PROTECTION IN STREAMING …