A Hybrid Method For K-Anonymization Using Clustering Technique
K-anonymity is a model to protect public released data from identification. These techniques have been focus of intense research in the last few years. An important requirement for such techniques is to minimize the information loss due to anonymization, it is crucial to group similar data together...
| Main Authors: | Abd.Rahim, Y, Sahib, S., Abd Ghani, M. K., Yaacob, A.H |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/363/ http://eprints.utem.edu.my/id/eprint/363/1/INCTS03-052017O.pdf |
Similar Items
Pseudonmization Techniques for Clinical Data: Privacy Study in Sultan Ismail Hospital Johor Bahru
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Collaborative healthcare information systems in privacy preservation based on K-anonymization model / Asmaa Hatem Rashid
by: Rashid, Asmaa Hatem
Published: (2014)
by: Rashid, Asmaa Hatem
Published: (2014)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Hybrid clustering-GWO-NARX neural network technique in predicting stock price
by: Das, Debashish, et al.
Published: (2017)
by: Das, Debashish, et al.
Published: (2017)
Stock prediction by applying hybrid Clustering-GWO-NARX neural network technique
by: Das, Debashish, et al.
Published: (2017)
by: Das, Debashish, et al.
Published: (2017)
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
Forecasting Using K-means Clustering and RNN Methods with PCA Feature Selection
by: Ferna, Marestiani, et al.
Published: (2022)
by: Ferna, Marestiani, et al.
Published: (2022)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
A skyline query processing approach over interval uncertain data stream with K-means clustering technique
by: Dzolkhifli, Zarina, et al.
Published: (2019)
by: Dzolkhifli, Zarina, et al.
Published: (2019)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Ontological knowledge management through hybrid unsupervised clustering techniques
by: Ching-Chieh, Kiu, et al.
Published: (2008)
by: Ching-Chieh, Kiu, et al.
Published: (2008)
Ontological knowledge management through hybrid unsupervised clustering techniques
by: Ching-Chieh, Kiu, et al.
Published: (2008)
by: Ching-Chieh, Kiu, et al.
Published: (2008)
UTMGO : a tool for searching a group of semantically related gene ontology terms and application to annotation of anonymous protein sequence
by: Deris, Safaai, et al.
Published: (2006)
by: Deris, Safaai, et al.
Published: (2006)
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021)
by: Arafat, N.H.M., et al.
Published: (2021)
Hybrid self organizing map for overlapping clusters
by: Md. Sap, Mohd. Noor, et al.
Published: (2008)
by: Md. Sap, Mohd. Noor, et al.
Published: (2008)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)
by: Armstrong, Helen, et al.
Published: (2003)
Improved Parameterless K-Means: Auto-Generation Centroids and Distance Data Point Clusters
by: Wan Maseri, Wan Mohd, et al.
Published: (2011)
by: Wan Maseri, Wan Mohd, et al.
Published: (2011)
A Comparative Agglomerative Hierarchical Clustering Method to Cluster Implemented Course
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
High reliability replication technique for web-server cluster systems
by: Deris, Mustafa Mat, et al.
Published: (2005)
by: Deris, Mustafa Mat, et al.
Published: (2005)
Clustering techniques for human posture recognition: K-Means, FCM and SOM
by: Kiran, Maleeha, et al.
Published: (2009)
by: Kiran, Maleeha, et al.
Published: (2009)
Improved K-means clustering and adaptive distance threshold for energy reduction in WSN-IoTs
by: Azamuddin, Ab Rahman, et al.
Published: (2025)
by: Azamuddin, Ab Rahman, et al.
Published: (2025)
Analysis of K-Mean and X-Mean Clustering Algorithms Using
Ontology-Based Dataset Filtering
by: Rahmah, Mokhtar, et al.
Published: (2021)
by: Rahmah, Mokhtar, et al.
Published: (2021)
Clustering technique in data mining : general and research perspective.
by: Che Mat @ Mohd. Shukor, Zamzarina, et al.
Published: (2002)
by: Che Mat @ Mohd. Shukor, Zamzarina, et al.
Published: (2002)
Fast and Accuracy Control Chart Pattern Recognition using a
New cluster-k-Nearest Neighbor
by: Brahim Belhaouari, samir
Published: (2008)
by: Brahim Belhaouari, samir
Published: (2008)
Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks
by: Muhammad , Imran, et al.
by: Muhammad , Imran, et al.
Fast and Accuracy Control Chart Pattern Recognition using a
New cluster-k-Nearest Neighbor
by: Brahim Belhaouari, samir
Published: (2009)
by: Brahim Belhaouari, samir
Published: (2009)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
Segmentation of CT Brain Images Using K-Means and EM Clustering
by: Lee, Tong Hau, et al.
Published: (2008)
by: Lee, Tong Hau, et al.
Published: (2008)
A comparison of clustering algorithms for data anonymization / Zahra Mahmoud
by: Zahra, Mahmoud
Published: (2019)
by: Zahra, Mahmoud
Published: (2019)
A hybrid ant colony optimization approach (hACO) for constructing load-balanced clusters
by: Ho, C. K., et al.
Published: (2005)
by: Ho, C. K., et al.
Published: (2005)
Predictive data mining based on similarity and clustering methods.
by: Defit, Sarjon, et al.
Published: (2000)
by: Defit, Sarjon, et al.
Published: (2000)
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
by: Wang, Dianhui, et al.
Published: (2008)
by: Wang, Dianhui, et al.
Published: (2008)
Frequent patterns minning of stock data using hybrid clustering association algorithm
by: B., Baharudin, et al.
Published: (2009)
by: B., Baharudin, et al.
Published: (2009)
Energy Efficient Technique for Cluster Head Selection and Data gathering in Wireless Sensor Network
by: Asfandyar, khan, et al.
Published: (2008)
by: Asfandyar, khan, et al.
Published: (2008)
Cluster Evaluation of Density Based Subspace Clustering
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
Anonymous feedback in e-learning systems
by: Dreher, Heinz
Published: (2005)
by: Dreher, Heinz
Published: (2005)
Similar Items
-
Pseudonmization Techniques for Clinical Data: Privacy Study in Sultan Ismail Hospital Johor Bahru
by: Abd.Rahim, Y, et al.
Published: (2011) -
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008) -
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020) -
Collaborative healthcare information systems in privacy preservation based on K-anonymization model / Asmaa Hatem Rashid
by: Rashid, Asmaa Hatem
Published: (2014) -
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.