Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    PedFed: A performance evaluation-driven federated learning framework for efficient communication

  • articleNo Access

    Scalable Anomaly Detection for Large-Scale Heterogeneous Data in Cloud Using Optimal Elliptic Curve Cryptography and Gaussian Kernel Fuzzy C-Means Clustering

  • articleNo Access

    k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY

  • articleNo Access

    ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION

  • articleNo Access

    DATA PRIVACY FOR SIMPLY ANONYMIZED SOCIAL NETWORK LOGS REPRESENTED AS GRAPHS – CONSIDERATIONS FOR GRAPH ALTERATION OPERATIONS

  • articleNo Access

    AN OVERVIEW OF p-SENSITIVE k-ANONYMITY MODELS FOR MICRODATA ANONYMIZATION

  • articleNo Access

    MULTIPLE RELEASES OF k-ANONYMOUS DATA SETS AND k-ANONYMOUS RELATIONAL DATABASES

  • articleNo Access

    PRESERVING TRADE SECRETS BETWEEN COMPETITORS IN B2B INTERACTIONS

  • articleNo Access

    Cost Effective Dynamic Concept Hierarchy Generation for Preserving Privacy

  • chapterNo Access

    10: Opportunities and Challenges in Federated Learning

  • chapterOpen Access

    Evaluation of patient re-identification using laboratory test orders and mitigation via latent space variables

  • chapterOpen Access

    All Together Now: Data Work to Advance Privacy, Science, and Health in the Age of Synthetic Data