Filters








1,979 Hits in 5.7 sec

Semantic Noise: Privacy-Protection of Nominal Microdata through Uncorrelated Noise Addition

Mercedes Rodriguez-Garcia, Montserrat Batet, David Sanchez
2015 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI)  
To protect this privacy, in this paper, we present the notion and practical enforcement of semantic noise, a semantically-grounded version of the numerical uncorrelated noise addition method, which is  ...  capable of masking textual data while properly preserving their semantics.  ...  This work was also made possible through the support of a grant from Templeton World Charity Foundation.  ... 
doi:10.1109/ictai.2015.157 dblp:conf/ictai/Rodriguez-Garcia15 fatcat:fabjlm4tvverjj54ofhv3tbnne

A Privacy-Aware Access Model on Anonymized Data [chapter]

Xuezhen Huang, Jiqiang Liu, Zhen Han
2015 Lecture Notes in Computer Science  
This paper details about various methods prevailing in literature for protecting privacy of anonymized medical data. Ontology Based measure to compute semantic similarity in Biomedicine is studied.  ...  This paper would promote a lot of research in the area of protecting privacy of anonymized medical data.  ...  This paper would promote a lot of research in the area of protecting privacy of anonymized medical data.  ... 
doi:10.1007/978-3-319-27998-5_13 fatcat:5t4n7lz4rjdqdnt4v7qklx73nq

A semantic framework to protect the privacy of electronic health records with non-numerical attributes

Sergio Martínez, David Sánchez, Aida Valls
2013 Journal of Biomedical Informatics  
To tackle this problem, Statistical Disclosure Control (SDC) methods have been proposed to mask sensitive attributes while preserving, up to a certain degree, the utility of anonymised data.  ...  In this paper, we propose a general framework to enable the accurate application of SDC methods to non-numerical clinical data, with a focus on the preservation of semantics.  ...  There have been cases of disclosure in a priori protected clinical data, such as the identification of the clinician and the patient in a late abortion case through the analysis of released tabular data  ... 
doi:10.1016/j.jbi.2012.11.005 pmid:23228807 fatcat:4l22l3axajfunahesf2op6ycfm

Towards k-Anonymous Non-numerical Data via Semantic Resampling [chapter]

Sergio Martínez, David Sánchez, Aïda Valls
2012 Communications in Computer and Information Science  
Our method has been applied to anonymise the well-known Adult Census dataset, showing that a semantic interpretation of non-numerical values better minimises the information loss of the masked data file  ...  a semantic perspective.  ...  Acknowledgements This work was partly funded by the Spanish Government through the projects CONSOLIDER INGENIO 2010 CSD2007-0004 "ARES" and eAEGIS TSI2007-65406-C03-02, and by the Government of Catalonia  ... 
doi:10.1007/978-3-642-31724-8_54 fatcat:nng2zkd5brbejmitbxrx5cuqua

The Text Anonymization Benchmark (TAB): A Dedicated Corpus and Evaluation Framework for Text Anonymization [article]

Ildikó Pilán, Pierre Lison, Lilja Øvrelid, Anthi Papadopoulou, David Sánchez, Montserrat Batet
2022 arXiv   pre-print
it difficult to properly evaluate the level of privacy protection offered by various anonymization methods.  ...  ought to be masked in order to conceal the identity of the person to be protected.  ...  Acknowledgments We acknowledge support from the Norwegian Research Council (CLEANUP project (http://cleanup.nr.no/), grant nr. 308904) and the Government of Catalonia (ICREA Acadèmia Prize to D.  ... 
arXiv:2202.00443v1 fatcat:x5hetrvgerh2tn6exocrtkph34

Toward sensitive document release with privacy guarantees

David Sánchez, Montserrat Batet
2017 Engineering applications of artificial intelligence  
data protection methods.  ...  In fact, textual documents are usually protected manually, in a process known as document redaction or sanitization.  ...  These methods aim at masking input data in a way that either identity or confidential attribute disclosure are minimized.  ... 
doi:10.1016/j.engappai.2016.12.013 fatcat:bivycjh7fvfmhkt4djlc6gy2ki

Semantic adaptive microaggregation of categorical microdata

Sergio Martínez, David Sánchez, Aida Valls
2012 Computers & security  
In the context of Statistical Disclosure Control, microaggregation is a privacy preserving method aimed to mask sensitive microdata prior to publication.  ...  Our approach has been evaluated and compared with related works when protecting real datasets with textual attribute values.  ...  This work was partly funded by the Spanish Government through the projects CONSOLIDER INGENIO 2010 CSD2007-0004 "ARES" and eAEGIS TSI2007-65406-C03-02,  ... 
doi:10.1016/j.cose.2012.04.003 fatcat:kz5tvrj4rfaj3dzts2cczu4pcm

Geo-Privacy Beyond Coordinates [chapter]

Grant McKenzie, Krzysztof Janowicz, Dara Seidl
2016 Lecture Notes in Geoinformation and Cartography  
The presented research is based on so-called semantic signatures that are mined from millions of geosocial checkins and enable a probabilistic framework on the level of geographic feature types, here Points  ...  ., tweets, are indicative of the user's location. We focus particularly on places and highlight how protecting place-based information differs from a purely spatial perspective.  ...  balance the protection of location privacy and preservation of spatial information [4] .  ... 
doi:10.1007/978-3-319-33783-8_10 fatcat:ruvgm2utevanrjtjojqc5g7lvy

C-sanitized: A privacy model for document redaction and sanitization

David Sánchez, Montserrat Batet
2015 Journal of the Association for Information Science and Technology  
Based on the well-established foundations of data semantics and the information theory, our model provides a framework to develop and implement automated and inherently semantic redaction/sanitization  ...  Moreover, contrary to ad-hoc redaction methods, our proposal provides a priori privacy guarantees which can be intuitively defined according to current legislations on data privacy.  ...  This limits the accuracy of the method according to the suitability of the knowledge base with respect to the contents of the document to be protected.  ... 
doi:10.1002/asi.23363 fatcat:5rq7pnxknjarnavnfxcajfyy6y

ANONYMIZATION OF SENSITIVE DATA IN UNSTRUCTURED DOCUMENTS USING NLP

Anushree Raj, Rio D'Souza
2021 International Journal of Mechanical Engineering & Technology (IJMET)  
Masking of sensitive information in structured data and data anonymization is possible through algorithms or techniques.  ...  further study or investigation by preserving the privacy of the concerned individual.  ...  Also, the General Data Protection Regulation (GDPR) [7] proposes a unified law of privacy protection on the processing of personal data and on the free circulation of such data, and it advises to take  ... 
doi:10.34218/ijmet.12.4.2021.002 fatcat:ustj3kkngrctxpjpuhllpifchm

Privacy-Preserving Technologies [chapter]

Josep Domingo-Ferrer, Alberto Blanco-Justicia
2020 The International Library of Ethics, Law and Technology  
This chapter introduces privacy and data protection by design, and reviews privacy-enhancing techniques (PETs).  ...  Specifically, it addresses PETs for: (1) identification, authentication and anonymity; (2) private communications; (3) privacy-preserving computations; (4) privacy in databases; and (5) discrimination  ...  The views in this paper are the authors' own and do not necessarily reflect the views of UNESCO or any of the funders.  ... 
doi:10.1007/978-3-030-29053-5_14 fatcat:lbnpp4vk4fe6xi7ftgphaxpnlm

A^4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation [article]

Rakshith Shetty and Bernt Schiele and Mario Fritz
2018 arXiv   pre-print
Text-based analysis methods allow to reveal privacy relevant author attributes such as gender, age and identify of the text's author.  ...  In this paper, we propose an automatic method, called Adversarial Author Attribute Anonymity Neural Translation (A^4NT), to combat such text-based adversaries.  ...  Examples of Style Transfer for anonymization Performance Across Input Difficulty Conclusions We presented a novel fully automatic method for protecting privacy sensitive attributes of an author against  ... 
arXiv:1711.01921v3 fatcat:s3wnqeufrbcgtcp4pntljugff4

Bootstrapping Text Anonymization Models with Distant Supervision [article]

Anthi Papadopoulou, Pierre Lison, Lilja Øvrelid, Ildikó Pilán
2022 arXiv   pre-print
We propose a novel method to bootstrap text anonymization models based on distant supervision.  ...  Evaluation results with a RoBERTa-based model and a manually annotated collection of 553 summaries showcase the potential of the approach, but also unveil a number of issues that may arise if the knowledge  ...  The approach also follows a privacy-first strategy that determines which terms to mask based on a privacy model (k-anonymity).  ... 
arXiv:2205.06895v1 fatcat:vmokqnqrgzg6hggznhiltrdeny

SEMANTIC COMPUTING AND PRIVACY: A CASE STUDY USING INFERRED GEO-LOCATION

GERALD FRIEDLAND, JAEYOUNG CHOI
2011 International Journal of Semantic Computing (IJSC)  
We conclude that the only way to tackle potential threats like this is for researchers to develop an enhanced notion of privacy for Semantic Computing.  ...  This paper presents an experiment that allows the inference over data published in social networks, resulting in a potentially severe privacy leak, more specifically the inference of geo-location resulting  ...  Opinions, findings, and conclusions or recommendations are those of the authors and do not necessarily reflect the views of the supporters.  ... 
doi:10.1142/s1793351x11001171 fatcat:5dpor5sskfdevouyqjt4ip5kk4

A Geoprivacy by Design Guideline for Research Campaigns That Use Participatory Sensing Data

Ourania Kounadi, Bernd Resch
2018 Journal of Empirical Research on Human Research Ethics  
The attributes of a monitored subject can be private, sensitive, or confidential information.  ...  Then, we propose privacy-preserving steps in four categories, namely, ensuring secure and safe settings, actions prior to the start of a research survey, processing and analysis of collected data, and  ...  According to Alrayes and Abdelmoty (2014) , LBSNs contain three types of semantics: the spatial semantics that can be used to infer places visited, the nonspatial semantics which are mostly textual information  ... 
doi:10.1177/1556264618759877 pmid:29683056 pmcid:PMC6011384 fatcat:3jussx36a5aopmw3un64q24tai
« Previous Showing results 1 — 15 out of 1,979 results