A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Semantic Noise: Privacy-Protection of Nominal Microdata through Uncorrelated Noise Addition
2015
2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI)
To protect this privacy, in this paper, we present the notion and practical enforcement of semantic noise, a semantically-grounded version of the numerical uncorrelated noise addition method, which is ...
capable of masking textual data while properly preserving their semantics. ...
This work was also made possible through the support of a grant from Templeton World Charity Foundation. ...
doi:10.1109/ictai.2015.157
dblp:conf/ictai/Rodriguez-Garcia15
fatcat:fabjlm4tvverjj54ofhv3tbnne
A Privacy-Aware Access Model on Anonymized Data
[chapter]
2015
Lecture Notes in Computer Science
This paper details about various methods prevailing in literature for protecting privacy of anonymized medical data. Ontology Based measure to compute semantic similarity in Biomedicine is studied. ...
This paper would promote a lot of research in the area of protecting privacy of anonymized medical data. ...
This paper would promote a lot of research in the area of protecting privacy of anonymized medical data. ...
doi:10.1007/978-3-319-27998-5_13
fatcat:5t4n7lz4rjdqdnt4v7qklx73nq
A semantic framework to protect the privacy of electronic health records with non-numerical attributes
2013
Journal of Biomedical Informatics
To tackle this problem, Statistical Disclosure Control (SDC) methods have been proposed to mask sensitive attributes while preserving, up to a certain degree, the utility of anonymised data. ...
In this paper, we propose a general framework to enable the accurate application of SDC methods to non-numerical clinical data, with a focus on the preservation of semantics. ...
There have been cases of disclosure in a priori protected clinical data, such as the identification of the clinician and the patient in a late abortion case through the analysis of released tabular data ...
doi:10.1016/j.jbi.2012.11.005
pmid:23228807
fatcat:4l22l3axajfunahesf2op6ycfm
Towards k-Anonymous Non-numerical Data via Semantic Resampling
[chapter]
2012
Communications in Computer and Information Science
Our method has been applied to anonymise the well-known Adult Census dataset, showing that a semantic interpretation of non-numerical values better minimises the information loss of the masked data file ...
a semantic perspective. ...
Acknowledgements This work was partly funded by the Spanish Government through the projects CONSOLIDER INGENIO 2010 CSD2007-0004 "ARES" and eAEGIS TSI2007-65406-C03-02, and by the Government of Catalonia ...
doi:10.1007/978-3-642-31724-8_54
fatcat:nng2zkd5brbejmitbxrx5cuqua
The Text Anonymization Benchmark (TAB): A Dedicated Corpus and Evaluation Framework for Text Anonymization
[article]
2022
arXiv
pre-print
it difficult to properly evaluate the level of privacy protection offered by various anonymization methods. ...
ought to be masked in order to conceal the identity of the person to be protected. ...
Acknowledgments We acknowledge support from the Norwegian Research Council (CLEANUP project (http://cleanup.nr.no/), grant nr. 308904) and the Government of Catalonia (ICREA Acadèmia Prize to D. ...
arXiv:2202.00443v1
fatcat:x5hetrvgerh2tn6exocrtkph34
Toward sensitive document release with privacy guarantees
2017
Engineering applications of artificial intelligence
data protection methods. ...
In fact, textual documents are usually protected manually, in a process known as document redaction or sanitization. ...
These methods aim at masking input data in a way that either identity or confidential attribute disclosure are minimized. ...
doi:10.1016/j.engappai.2016.12.013
fatcat:bivycjh7fvfmhkt4djlc6gy2ki
Semantic adaptive microaggregation of categorical microdata
2012
Computers & security
In the context of Statistical Disclosure Control, microaggregation is a privacy preserving method aimed to mask sensitive microdata prior to publication. ...
Our approach has been evaluated and compared with related works when protecting real datasets with textual attribute values. ...
This work was partly funded by the Spanish Government through the projects CONSOLIDER INGENIO 2010 CSD2007-0004 "ARES" and eAEGIS TSI2007-65406-C03-02, ...
doi:10.1016/j.cose.2012.04.003
fatcat:kz5tvrj4rfaj3dzts2cczu4pcm
Geo-Privacy Beyond Coordinates
[chapter]
2016
Lecture Notes in Geoinformation and Cartography
The presented research is based on so-called semantic signatures that are mined from millions of geosocial checkins and enable a probabilistic framework on the level of geographic feature types, here Points ...
., tweets, are indicative of the user's location. We focus particularly on places and highlight how protecting place-based information differs from a purely spatial perspective. ...
balance the protection of location privacy and preservation of spatial information [4] . ...
doi:10.1007/978-3-319-33783-8_10
fatcat:ruvgm2utevanrjtjojqc5g7lvy
C-sanitized: A privacy model for document redaction and sanitization
2015
Journal of the Association for Information Science and Technology
Based on the well-established foundations of data semantics and the information theory, our model provides a framework to develop and implement automated and inherently semantic redaction/sanitization ...
Moreover, contrary to ad-hoc redaction methods, our proposal provides a priori privacy guarantees which can be intuitively defined according to current legislations on data privacy. ...
This limits the accuracy of the method according to the suitability of the knowledge base with respect to the contents of the document to be protected. ...
doi:10.1002/asi.23363
fatcat:5rq7pnxknjarnavnfxcajfyy6y
ANONYMIZATION OF SENSITIVE DATA IN UNSTRUCTURED DOCUMENTS USING NLP
2021
International Journal of Mechanical Engineering & Technology (IJMET)
Masking of sensitive information in structured data and data anonymization is possible through algorithms or techniques. ...
further study or investigation by preserving the privacy of the concerned individual. ...
Also, the General Data Protection Regulation (GDPR) [7] proposes a unified law of privacy protection on the processing of personal data and on the free circulation of such data, and it advises to take ...
doi:10.34218/ijmet.12.4.2021.002
fatcat:ustj3kkngrctxpjpuhllpifchm
Privacy-Preserving Technologies
[chapter]
2020
The International Library of Ethics, Law and Technology
This chapter introduces privacy and data protection by design, and reviews privacy-enhancing techniques (PETs). ...
Specifically, it addresses PETs for: (1) identification, authentication and anonymity; (2) private communications; (3) privacy-preserving computations; (4) privacy in databases; and (5) discrimination ...
The views in this paper are the authors' own and do not necessarily reflect the views of UNESCO or any of the funders. ...
doi:10.1007/978-3-030-29053-5_14
fatcat:lbnpp4vk4fe6xi7ftgphaxpnlm
A^4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation
[article]
2018
arXiv
pre-print
Text-based analysis methods allow to reveal privacy relevant author attributes such as gender, age and identify of the text's author. ...
In this paper, we propose an automatic method, called Adversarial Author Attribute Anonymity Neural Translation (A^4NT), to combat such text-based adversaries. ...
Examples of Style Transfer for anonymization
Performance Across Input Difficulty
Conclusions We presented a novel fully automatic method for protecting privacy sensitive attributes of an author against ...
arXiv:1711.01921v3
fatcat:s3wnqeufrbcgtcp4pntljugff4
Bootstrapping Text Anonymization Models with Distant Supervision
[article]
2022
arXiv
pre-print
We propose a novel method to bootstrap text anonymization models based on distant supervision. ...
Evaluation results with a RoBERTa-based model and a manually annotated collection of 553 summaries showcase the potential of the approach, but also unveil a number of issues that may arise if the knowledge ...
The approach also follows a privacy-first strategy that determines which terms to mask based on a privacy model (k-anonymity). ...
arXiv:2205.06895v1
fatcat:vmokqnqrgzg6hggznhiltrdeny
SEMANTIC COMPUTING AND PRIVACY: A CASE STUDY USING INFERRED GEO-LOCATION
2011
International Journal of Semantic Computing (IJSC)
We conclude that the only way to tackle potential threats like this is for researchers to develop an enhanced notion of privacy for Semantic Computing. ...
This paper presents an experiment that allows the inference over data published in social networks, resulting in a potentially severe privacy leak, more specifically the inference of geo-location resulting ...
Opinions, findings, and conclusions or recommendations are those of the authors and do not necessarily reflect the views of the supporters. ...
doi:10.1142/s1793351x11001171
fatcat:5dpor5sskfdevouyqjt4ip5kk4
A Geoprivacy by Design Guideline for Research Campaigns That Use Participatory Sensing Data
2018
Journal of Empirical Research on Human Research Ethics
The attributes of a monitored subject can be private, sensitive, or confidential information. ...
Then, we propose privacy-preserving steps in four categories, namely, ensuring secure and safe settings, actions prior to the start of a research survey, processing and analysis of collected data, and ...
According to Alrayes and Abdelmoty (2014) , LBSNs contain three types of semantics: the spatial semantics that can be used to infer places visited, the nonspatial semantics which are mostly textual information ...
doi:10.1177/1556264618759877
pmid:29683056
pmcid:PMC6011384
fatcat:3jussx36a5aopmw3un64q24tai
« Previous
Showing results 1 — 15 out of 1,979 results