Tag

k-anonymity

0 views collected around this technical thread.

IT Services Circle
IT Services Circle
May 20, 2025 · Information Security

Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity

This article presents six practical data‑desensitization methods—including string replacement, encryption, database masking, cache‑based replacement, dynamic AOP masking, and K‑anonymity—explains their principles, shows Java implementations, compares security, performance, and reversibility, and offers concrete recommendations for protecting sensitive fields such as phone numbers and ID cards.

Javadata maskingencryption
0 likes · 8 min read
Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity
DataFunTalk
DataFunTalk
Apr 17, 2020 · Artificial Intelligence

Data Privacy and Differential Privacy Techniques for Machine Learning

The article reviews the growing importance of data privacy in machine learning, explains privacy concepts and attack vectors, and details anonymization methods such as k‑anonymity, l‑diversity, t‑closeness, as well as differential privacy techniques and their practical applications.

data privacydifferential privacyinformation security
0 likes · 13 min read
Data Privacy and Differential Privacy Techniques for Machine Learning