A conceptual anonymity model to ensure privacy for sensitive network data
In today's world, a great amount of people, devices, and sensors are well connected through various online platforms, and the interactions between these entities produce massive amounts of useful information. This process of data production and sharing appears to be on the rise. The growing pop...
| Main Authors: | Arafat, N.H.M., Pramanik, Md Ileas, Abu Jafar, Md Muzahid, Lu, Bibo, Jahan, Sumaiya, Murad, Saydul Akbar |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/42380/ http://umpir.ump.edu.my/id/eprint/42380/1/A%20conceptual%20anonymity%20model%20to%20ensure%20privacy.pdf http://umpir.ump.edu.my/id/eprint/42380/2/A%20conceptual%20anonymity%20model%20to%20ensure%20privacy%20for%20sensitive%20network%20data_ABS.pdf |
Similar Items
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
Collaborative healthcare information systems in privacy preservation based on K-anonymization model / Asmaa Hatem Rashid
by: Rashid, Asmaa Hatem
Published: (2014)
by: Rashid, Asmaa Hatem
Published: (2014)
A review on job scheduling technique in cloud computing and priority rule based intelligent framework
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
Impact learning: A learning method from feature's impact and competition
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
Comparative study on job scheduling using priority rule and machine learning
by: Murad, Saydul Akbar, et al.
Published: (2021)
by: Murad, Saydul Akbar, et al.
Published: (2021)
Impact learning : A learning method from feature’s impact and competition
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
A new priority rule cloud scheduling technique that utilizes gaps to increase the efficiency of jobs distribution
by: Saydul Akbar, Murad
Published: (2023)
by: Saydul Akbar, Murad
Published: (2023)
Impact learning: A learning method from feature’s impact and competition
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
by: Murad, Saydul Akbar, et al.
Published: (2024)
by: Murad, Saydul Akbar, et al.
Published: (2024)
Multiple vehicle cooperation and collision avoidance in automated vehicles : Survey and an AI‑enabled conceptual framework
by: Abu Jafar, Md Muzahid, et al.
Published: (2023)
by: Abu Jafar, Md Muzahid, et al.
Published: (2023)
AI powered asthma prediction towards treatment formulation : An android app approach
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
Reinforcement learning based decision-making model in autonomous vehicle control for cooperation and mitigation of collision among multiple vehicles
by: Abu Jafar, Md Muzahid
Published: (2022)
by: Abu Jafar, Md Muzahid
Published: (2022)
AI powered asthma prediction towards treatment formulation: an android app approach
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
A Hybrid Method For K-Anonymization Using Clustering Technique
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
Transfer learning for sentiment analysis using bert based supervised fine-tuning
by: Prottasha, Nusrat Jahan, et al.
Published: (2022)
by: Prottasha, Nusrat Jahan, et al.
Published: (2022)
Priority based job scheduling technique that utilizes gaps to increase the efficiency of job distribution in cloud computing
by: Murad, Saydul Akbar, et al.
Published: (2024)
by: Murad, Saydul Akbar, et al.
Published: (2024)
A deep Spatio-temporal network for vision-based sexual harassment detection
by: Islam, Md Shamimul, et al.
Published: (2021)
by: Islam, Md Shamimul, et al.
Published: (2021)
The Development and Deployment of an Online Exam System A Web Application
by: Islam, Md. Monarul, et al.
Published: (2023)
by: Islam, Md. Monarul, et al.
Published: (2023)
Computer-aided system for extending the performance of diabetes analysis and prediction
by: Murad, Saydul Akbar, et al.
Published: (2021)
by: Murad, Saydul Akbar, et al.
Published: (2021)
A Comprehensive Review on Deep Learning Assisted Computer Vision Techniques for Smart Greenhouse Agriculture
by: Akbar, Jalal Uddin Md, et al.
Published: (2024)
by: Akbar, Jalal Uddin Md, et al.
Published: (2024)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Edge assisted crime prediction and evaluation framework for machine learning algorithms
by: Adhikary, Apurba, et al.
Published: (2022)
by: Adhikary, Apurba, et al.
Published: (2022)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
UTMGO : a tool for searching a group of semantically related gene ontology terms and application to annotation of anonymous protein sequence
by: Deris, Safaai, et al.
Published: (2006)
by: Deris, Safaai, et al.
Published: (2006)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
Learning-based conceptual framework for threat assessment of multiple vehicle collision in autonomous driving
by: Muzahid, Abu Jafar Md, et al.
Published: (2020)
by: Muzahid, Abu Jafar Md, et al.
Published: (2020)
Automated palm oil supply chain system with traceability
by: Rahman, Md. Arafatur, et al.
Published: (2021)
by: Rahman, Md. Arafatur, et al.
Published: (2021)
Priority based fair scheduling : Enhancing efficiency in cloud job distribution
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
4D : A real-time driver drowsiness detector using deep learning
by: Jahan, Israt, et al.
Published: (2023)
by: Jahan, Israt, et al.
Published: (2023)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Similar Items
-
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023) -
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020) -
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al. -
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008) -
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)