We use k-anonymity to explore the issue of anonymity preservation. Since we do not use generalization, we do not need a priori knowledge of attribute semantics.
More- over, kACTUS-2 efficiently uses multi-dimensional suppression and swapping so that the performance of the new method outperforms previous algorithm and ...
We propose an algorithm for privacy preserving data mining that performs dataset anonymization using the k-anonymity model while taking into account its effect ...
More- over, kACTUS-2 efficiently uses multi-dimensional suppression and swapping so that the performance of the new method outperforms previous algorithm and ...
k-anonymity is the method used for masking sensitive data which successfully solves the problem of re-linking of data with an external source and makes it ...
kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity. S. Kisilevich, Y. Elovici, B. Shapira, L. Rokach. Protecting Persons While Protecting ...
Dive into the research topics of 'KACTUS 2: Privacy preserving in classification tasks using k-anonymity'. Together they form a unique fingerprint. Sort by ...
People also ask
What is the K anonymity approach?
What is the difference between K anonymity and differential privacy?
In this paper a new method is presented for preserving the privacy in classification tasks using k-anonymity. The proposed method requires no prior knowledge ...
Apr 19, 2018 · A general k-anonymity framework was also designed, which can be used with various utility measures to achieve k-anonymity with a small utility ...
The algorithm uses feature selection for reducing the data dimensionality and then combines attribute and record suppression for obtaining k-anonymity. The ...