The k-anonymity model is a privacy-preserving approach that has been extensively studied for the past few years. To minimize the information loss due to anonymization, it is crucial to group similar data together and then anonymize each group individually. This work proposes a clustering-based k-anonymization method that runs in O(n 2 k) time. We experimentally compare our method with another clustering-based k-anonymization method recently proposed by Byun et al. Even though their method has a time complexity of O(n2), the experiments show that our method outperforms their method with respect to information loss and resilience to outliers. 1
k-anonymization techniques have been the focus of intense research in the last few years. An importa...
k-anonymization techniques have been the focus of intense research in the last few years. An importa...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
This paper presents a clustering (Clustering partitions record into clusters such that records withi...
This paper presents a clustering (Clustering partitions record into clusters such that records withi...
K-anonymity is a model to protect public released data from identification. These techniques have be...
K-anonymisation is an approach to protecting private information contained within a dataset. Many k-...
K-anonymisation is an approach to protecting private information contained within a dataset. Many k-...
Abstract—Nowadays, people pay great attention to the privacy protection, therefore the technology of...
K-anonymisation is a technique for protecting privacy contained within a dataset. Many k-anonymisati...
K-anonymisation is a technique for protecting privacy contained within a dataset. Many k-anonymisati...
K-anonymisation is a technique for protecting privacy contained within a dataset. Many k-anonymisati...
K-anonymisation is an approach to protecting individuals from being identified from data. Good k-ano...
K-anonymisation is an approach to protecting individuals from being identified from data. Good k-ano...
K-anonymisation is an approach to protecting individuals from being identified from data. Good k-ano...
k-anonymization techniques have been the focus of intense research in the last few years. An importa...
k-anonymization techniques have been the focus of intense research in the last few years. An importa...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
This paper presents a clustering (Clustering partitions record into clusters such that records withi...
This paper presents a clustering (Clustering partitions record into clusters such that records withi...
K-anonymity is a model to protect public released data from identification. These techniques have be...
K-anonymisation is an approach to protecting private information contained within a dataset. Many k-...
K-anonymisation is an approach to protecting private information contained within a dataset. Many k-...
Abstract—Nowadays, people pay great attention to the privacy protection, therefore the technology of...
K-anonymisation is a technique for protecting privacy contained within a dataset. Many k-anonymisati...
K-anonymisation is a technique for protecting privacy contained within a dataset. Many k-anonymisati...
K-anonymisation is a technique for protecting privacy contained within a dataset. Many k-anonymisati...
K-anonymisation is an approach to protecting individuals from being identified from data. Good k-ano...
K-anonymisation is an approach to protecting individuals from being identified from data. Good k-ano...
K-anonymisation is an approach to protecting individuals from being identified from data. Good k-ano...
k-anonymization techniques have been the focus of intense research in the last few years. An importa...
k-anonymization techniques have been the focus of intense research in the last few years. An importa...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...