Login / Signup
Real-world K-Anonymity Applications: the \textsc{KGen} approach and its evaluation in Fraudulent Transactions.
Daniel De Pascale
Giuseppe Cascavilla
Damian A. Tamburri
Willem-Jan van den Heuvel
Published in:
CoRR (2022)
Keyphrases
</>
real world
data sets
databases
privacy preserving
evaluation method
privacy protection
database
wide range
data mining
database systems
synthetic data
third party
distributed database systems
information loss
database transactions