Cargando…

Verification of De-Identification Techniques for Personal Information Using Tree-Based Methods with Shapley Values

With the development of big data and cloud computing technologies, the importance of pseudonym information has grown. However, the tools for verifying whether the de-identification methodology is correctly applied to ensure data confidentiality and usability are insufficient. This paper proposes a v...

Descripción completa

Detalles Bibliográficos
Autores principales: Lee, Junhak, Jeong, Jinwoo, Jung, Sungji, Moon, Jihoon, Rho, Seungmin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8877642/
https://www.ncbi.nlm.nih.gov/pubmed/35207676
http://dx.doi.org/10.3390/jpm12020190