咨询与建议

限定检索结果

文献类型

  • 132 篇 期刊文献
  • 105 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 239 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 177 篇 计算机科学与技术...
    • 60 篇 电气工程
    • 34 篇 信息与通信工程
    • 31 篇 软件工程
    • 12 篇 控制科学与工程
    • 6 篇 网络空间安全
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
  • 46 篇 管理学
    • 26 篇 公共管理
    • 16 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 39 篇 医学
    • 34 篇 基础医学(可授医学...
    • 5 篇 特种医学
    • 4 篇 公共卫生与预防医...
    • 4 篇 医学技术(可授医学...
    • 3 篇 临床医学
    • 2 篇 中西医结合
  • 18 篇 理学
    • 6 篇 数学
    • 5 篇 物理学
    • 4 篇 生物学
    • 2 篇 化学
    • 2 篇 地理学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 农学
  • 2 篇 经济学
    • 1 篇 理论经济学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 1 篇 法学
  • 1 篇 艺术学

主题

  • 239 篇 data anonymizati...
  • 50 篇 privacy
  • 34 篇 data privacy
  • 27 篇 k-anonymity
  • 23 篇 privacy preserva...
  • 15 篇 data security
  • 13 篇 differential pri...
  • 10 篇 mapreduce
  • 10 篇 data publishing
  • 10 篇 security
  • 9 篇 natural language...
  • 9 篇 l-diversity
  • 8 篇 privacy protecti...
  • 8 篇 privacy preservi...
  • 8 篇 data protection
  • 7 篇 big data
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 6 篇 data utility
  • 6 篇 clustering

机构

  • 3 篇 southeast univ s...
  • 3 篇 tsinghua univ de...
  • 3 篇 univ technol syd...
  • 2 篇 st michaels hosp...
  • 2 篇 univ so queensla...
  • 2 篇 havelsan inc dep...
  • 2 篇 univ so queensla...
  • 2 篇 hacettepe univ d...
  • 2 篇 sci & technol co...
  • 2 篇 csiro hobart tas
  • 2 篇 ain shams univ f...
  • 2 篇 beijing univ pos...
  • 2 篇 csiro nsw
  • 2 篇 nanjing univ sta...
  • 2 篇 fraunhofer iosb ...
  • 2 篇 natl univ kaohsi...
  • 2 篇 george mason uni...
  • 2 篇 anna univ dept c...
  • 2 篇 sax inst nsw
  • 2 篇 kanazawa univ ka...

作者

  • 9 篇 prasser fabian
  • 6 篇 domingo-ferrer j...
  • 6 篇 lin wen-yang
  • 5 篇 kuhn klaus a.
  • 4 篇 zhang yanchun
  • 4 篇 zhang xuyun
  • 4 篇 chen jinjun
  • 4 篇 liu chang
  • 4 篇 wang hua
  • 4 篇 sun xiaoxun
  • 4 篇 wang jie-teng
  • 3 篇 mambo masahiro
  • 3 篇 li ninghui
  • 3 篇 kondylakis harid...
  • 3 篇 jiang chunxiao
  • 3 篇 li tiancheng
  • 3 篇 nepal surya
  • 3 篇 xu lei
  • 3 篇 gunawan dedi
  • 3 篇 dou wanchun

语言

  • 234 篇 英文
  • 4 篇 其他
  • 1 篇 土耳其文
检索条件"主题词=data anonymization"
239 条 记 录,以下是1-10 订阅
排序:
Enhancing efficiency and data utility in longitudinal data anonymization
收藏 引用
INFORMATION SCIENCES 2025年 704卷
作者: Amiri, Fatemeh Sanchez, David Domingo-Ferrer, Josep Hamedan Univ Technol Dept Comp Engn Hamadan Iran Univ Rovira & Virgili CYBERCAT Ctr Cybersecur Res Catalonia Dept Comp Engn & Math Ave Paisos Catalans 26 E-43007 Tarragona Catalonia Spain
Longitudinal data consist of observations collected over time from a set of individuals. The accumulation of information on each individual over time makes longitudinal data particularly privacy-sensitive. However, ex... 详细信息
来源: 评论
Parallel privacy preservation through partitioning (P4): a scalable data anonymization algorithm for health data
收藏 引用
BMC MEDICAL INFORMATICS AND DECISION MAKING 2025年 第1期25卷 1-12页
作者: Halilovic, Mehmed Meurers, Thierry Otte, Karen Prasser, Fabian Charite Univ Med Berlin Berlin Inst Hlth Med Informat Grp Charitepl 1 D-10117 Berlin Germany
BackgroundSharing health data holds great potential for advancing medical research but also poses many challenges, including the need to protect people's privacy. One approach to address this is data anonymization... 详细信息
来源: 评论
data anonymization evaluation for big data and IoT environment
收藏 引用
INFORMATION SCIENCES 2022年 605卷 381-392页
作者: Ni, Chunchun Cang, Li Shan Gope, Prosanta Min, Geyong Univ Elect Sci Technol China Dept Comp Sci Chengdu Peoples R China Univ Sheffield Dept Comp Sci Sheffield S1 4DP England Univ Exeter Dept Comp Sci Exeter EX4 4QF Devon England
The growth of big data can increase risks of re-identification in complex IoT environment. data anonymization is widely used to prevent shared data from being re-identified private or sensitive information from anonym... 详细信息
来源: 评论
data anonymization With Diversity Constraints
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND data ENGINEERING 2023年 第4期35卷 3603-3618页
作者: Milani, Mostafa Huang, Yu Chiang, Fei Univ Western Ontario Dept Comp Sci London ON N6A 3K7 Canada McMaster Univ Dept Comp & Software Hamilton ON L8S 4L8 Canada
Recent privacy legislation has aimed to restrict and control the amount of personal data published by companies and shared with third parties. Much of this real data is not only sensitive requiring anonymization but a... 详细信息
来源: 评论
data anonymization evaluation against re-identification attacks in edge storage
收藏 引用
WIRELESS NETWORKS 2024年 第6期30卷 5263-5277页
作者: Chen, Minghui Cang, Li Shan Chang, Zheng Iqbal, Muddesar Almakhles, Dhafer UESTC Sch Comp Sci & Engn Chengdu Peoples R China UESTC Chengdu Peoples R China London South Bank Univ London England Prince Sultan Univ Coll Engn Riyadh 11586 Saudi Arabia
Edge storage is driven by the emerging edge computing and application intelligence, which makes the data anonymization become essential to guarantee the security of the data. The risk with data anonymization is that i... 详细信息
来源: 评论
data anonymization for Requirements Quality Analysis: a Reproducible Automatic Error Detection Task  11
Data Anonymization for Requirements Quality Analysis: a Repr...
收藏 引用
11th International Conference on Language Resources and Evaluation (LREC)
作者: Kang, Juyeon Park, Jungyeul PROMETIL 52 Rue Jacques Babinet F-31100 Toulouse France CONJECTO 74 Rue Paris F-35000 Rennes France
In this work, we aim at identifying potential problems of ambiguity, completeness, conformity, singularity and readability in system and software requirements specifications. Those problems arise particularly when the... 详细信息
来源: 评论
data anonymization Based on Natural Equivalent Class  23
Data Anonymization Based on Natural Equivalent Class
收藏 引用
IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD)
作者: Guo, Naixuan Yang, Ming Gong, Qiyuan Chen, Zhouguo Luo, Junzhou Southeast Univ Sch Comp Sci & Engn Nanjing Jiangsu Peoples R China Sci & Technol Commun Secur Lab Chengdu Sichuan Peoples R China
data anonymization is widely used to preserve the utility of published datasets without compromising privacy. The state-of-the-art data anonymization approaches are mainly single-record-based algorithms. They group si... 详细信息
来源: 评论
data anonymization Through Slicing Based on Graph-Based Vertical Partitioning  3rd
收藏 引用
3rd International Conference on Advanced Computing, Networking, and Informatics (ICACNI)
作者: Sharma, Kushagra Jayashankar, Aditi Banu, K. Sharmila Tripathy, B. K. VIT Univ Sch Comp Sci & Engn Vellore 632014 Tamil Nadu India
data anonymization is a technique that uses data distortion to preserve privacy of public data to be published. Several data anonymization techniques and principles have been proposed in the past such as k-anonymity, ... 详细信息
来源: 评论
From t-closeness to differential privacy and vice versa in data anonymization
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2015年 第Jan.期74卷 151-158页
作者: Domingo-Ferrer, Josep Soria-Comas, Jordi Univ Rovira & Virgili Dept Comp Engn & Maths UNESCO Chair Data Privacy E-43007 Tarragona Spain
k-anonymity and epsilon-differential privacy are two mainstream privacy models, the former introduced to anonymize data sets and the latter to limit the knowledge gain that results from including one individual in the... 详细信息
来源: 评论
Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2017年 74卷 393-408页
作者: Nayahi, J. Jesu Vedha Kavitha, V. Anna Univ Dept Comp Sci & Engn Reg Campus Tirunelveli Tirunelveli 627007 Tamil Nadu India Univ Coll Engn Dept Comp Sci & Engn Kancheepuram Campus Kancheepuram 631552 India
data privacy is a stringent need when sharing and processing data on a distributed environment or in Internet of Things. Collaborative privacy-preserving data mining based on secured multiparty computation incur high ... 详细信息
来源: 评论