You are currently viewing a new version of our website. To view the old version click .

10 Results Found

  • Article
  • Open Access
1,558 Views
22 Pages

Novel Synthetic Dataset Generation Method with Privacy-Preserving for Intrusion Detection System

  • JaeCheol Kim,
  • Seungun Park,
  • Jaesik Cha,
  • Eunyeong Son and
  • Yunsik Son

30 September 2025

The expansion of Internet of Things (IoT) networks has enabled real-time data collection and automation across smart cities, healthcare, and agriculture, delivering greater convenience and efficiency; however, exposure to diverse threats has also inc...

  • Article
  • Open Access
1 Citations
3,085 Views
25 Pages

A Novel Privacy Paradigm for Improving Serial Data Privacy

  • Ayesha Shaukat,
  • Adeel Anjum,
  • Saif U. R. Malik,
  • Munam Ali Shah and
  • Carsten Maple

6 April 2022

Protecting the privacy of individuals is of utmost concern in today’s society, as inscribed and governed by the prevailing privacy laws, such as GDPR. In serial data, bits of data are continuously released, but their combined effect may result...

  • Article
  • Open Access
1 Citations
1,628 Views
17 Pages

11 August 2025

Distributed digital identity is an emerging identity management technology aimed at achieving comprehensive interconnectivity between digital objects. However, there is still the problem of privacy leakage in distributed identities, and selective dis...

  • Article
  • Open Access
1 Citations
1,551 Views
19 Pages

11 April 2024

The widespread use of data makes privacy protection an urgent problem that must be addressed. Anonymity is a traditional technique that is used to protect private information. In multi-source data scenarios, if attackers have background knowledge of...

  • Article
  • Open Access
5 Citations
2,202 Views
14 Pages

Enhancing Utility in Anonymized Data against the Adversary’s Background Knowledge

  • Fatemeh Amiri,
  • Razaullah Khan,
  • Adeel Anjum,
  • Madiha Haider Syed and
  • Semeen Rehman

23 March 2023

Recent studies have shown that data are some of the most valuable resources for making government policies and business decisions in different organizations. In privacy preserving, the challenging task is to keep an individual’s data protected...

  • Article
  • Open Access
7 Citations
4,257 Views
19 Pages

30 November 2022

With the development of big data, data collection and publishing are symmetrical. The purpose of data collection is to better publish data. To better collect user data and promote data analysis, publishing massive amounts of data can better provide s...

  • Article
  • Open Access
5 Citations
1,836 Views
18 Pages

27 September 2023

Data stored in the Internet of Vehicles (IoV) face problems with ease of tampering, easy disclosure and single access control. Based on this problem, we propose an access control scheme for the IoV based on blockchain, trust values and weighted attri...

  • Article
  • Open Access
4 Citations
2,367 Views
21 Pages

Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing

  • Zenab Amin,
  • Adeel Anjum,
  • Abid Khan,
  • Awais Ahmad and
  • Gwanggil Jeon

In the modern world of digitalization, data growth, aggregation and sharing have escalated drastically. Users share huge amounts of data due to the widespread adoption of Internet-of-things (IoT) and cloud-based smart devices. Such data could have co...

  • Article
  • Open Access
4 Citations
2,761 Views
16 Pages

19 November 2024

With the development of the data-sharing system in recent years, financial management systems and their privacy have sparked great interest. Existing financial data-sharing systems store metadata, which include a hash value and database index on the...

  • Article
  • Open Access
10 Citations
3,430 Views
19 Pages

4 April 2023

Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to save storage and computing cost. Therefore, the efficient realization of one-to-many communication of data on the premise of ensuring the security of cloud stora...