© Springer International Publishing Switzerland 2015 83 Dissemination of data with sensitive information has an implicit risk of unauthorised disclosure. Several masking methods have been developed in order to protect the data without losing too much information. One of the methods is called the Post Randomisation Method (PRAM) which is based on perturbations according to a Markov probability transition matrix. However, the method has the drawback that it is difficult to find an optimal transition matrix to perform perturbations which maximise data utility. In this paper we present an study of data privacy from the point of view of optimisation using evolutionary algorithms to generate optimal probability transition matrices. Optimality is ...
Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in wh...
With the growing concerns over data privacy and new regulations like the General Data Protection Reg...
To preserve client privacy in the data mining process, a variety of techniques based on random pertu...
Dissemination of data with sensitive information has an implicit risk of unauthorized disclosure. Se...
PRAM (Post Randomization Method) was introduced in 1997 but it is still one of the least used method...
The amount of public statistical information available is growing and more accurate protection metho...
Post Randomization Methods (PRAM) are among the most popular disclosure limitation techniques for bo...
Dissemination of data with sensitive information about individuals has an implicit risk of unauthori...
Randomization has emerged as an important approach for data disguising in Privacy-Preserving Data Pu...
The randomized response (RR) technique is a promising technique to disguise private categorical data...
It is a challenging concern in data collecting, publishing, and mining when personal information is ...
Privacy preservation is that the most targeted issue in information publication, because the sensiti...
This paper describes the Post Randomisation Method (PRAM) as a method for disclosure protection of m...
This paper describes the Post Randomisation Method (PRAM) for disclosure protection of microdata. Ap...
We examine a generalised randomised response (RR) technique in the context of differential privacy a...
Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in wh...
With the growing concerns over data privacy and new regulations like the General Data Protection Reg...
To preserve client privacy in the data mining process, a variety of techniques based on random pertu...
Dissemination of data with sensitive information has an implicit risk of unauthorized disclosure. Se...
PRAM (Post Randomization Method) was introduced in 1997 but it is still one of the least used method...
The amount of public statistical information available is growing and more accurate protection metho...
Post Randomization Methods (PRAM) are among the most popular disclosure limitation techniques for bo...
Dissemination of data with sensitive information about individuals has an implicit risk of unauthori...
Randomization has emerged as an important approach for data disguising in Privacy-Preserving Data Pu...
The randomized response (RR) technique is a promising technique to disguise private categorical data...
It is a challenging concern in data collecting, publishing, and mining when personal information is ...
Privacy preservation is that the most targeted issue in information publication, because the sensiti...
This paper describes the Post Randomisation Method (PRAM) as a method for disclosure protection of m...
This paper describes the Post Randomisation Method (PRAM) for disclosure protection of microdata. Ap...
We examine a generalised randomised response (RR) technique in the context of differential privacy a...
Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in wh...
With the growing concerns over data privacy and new regulations like the General Data Protection Reg...
To preserve client privacy in the data mining process, a variety of techniques based on random pertu...