Skip to main content

Showing 1–11 of 11 results for author: Vatsalan, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.00879  [pdf, other

    cs.SE cs.CY

    SoK: Demystifying Privacy Enhancing Technologies Through the Lens of Software Developers

    Authors: Maisha Boteju, Thilina Ranbaduge, Dinusha Vatsalan, Nalin Asanka Gamagedara Arachchilage

    Abstract: In the absence of data protection measures, software applications lead to privacy breaches, posing threats to end-users and software organisations. Privacy Enhancing Technologies (PETs) are technical measures that protect personal data, thus minimising such privacy breaches. However, for software applications to deliver data protection using PETs, software developers should actively and correctly… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

  2. arXiv:2301.04000  [pdf, other

    cs.CR cs.LG

    Privacy-Preserving Record Linkage for Cardinality Counting

    Authors: Nan Wu, Dinusha Vatsalan, Mohamed Ali Kaafar, Sanath Kumar Ramesh

    Abstract: Several applications require counting the number of distinct items in the data, which is known as the cardinality counting problem. Example applications include health applications such as rare disease patients counting for adequate awareness and funding, and counting the number of cases of a new disease for outbreak detection, marketing applications such as counting the visibility reached for a n… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

  3. Privacy-Preserving Record Linkage

    Authors: Dinusha Vatsalan, Dimitrios Karapiperis, Vassilios S. Verykios

    Abstract: Given several databases containing person-specific data held by different organizations, Privacy-Preserving Record Linkage (PPRL) aims to identify and link records that correspond to the same entity/individual across different databases based on the matching of personal identifying attributes, such as name and address, without revealing the actual values in these attributes due to privacy concerns… ▽ More

    Submitted 11 December, 2022; originally announced December 2022.

    Comments: PP. 1 - 10

    Report number: Reference Work Entry - Version 2 (Original entry - https://doi.org/10.1007/978-3-319-63962-8_17-1)

    Journal ref: Springer Encyclopedia of Big Data Technologies, 2022

  4. arXiv:2211.02161  [pdf, ps, other

    cs.CR cs.DB cs.DS cs.IR cs.LG

    Privacy-preserving Deep Learning based Record Linkage

    Authors: Thilina Ranbaduge, Dinusha Vatsalan, Ming Ding

    Abstract: Deep learning-based linkage of records across different databases is becoming increasingly useful in data integration and mining applications to discover new insights from multiple sources of data. However, due to privacy and confidentiality concerns, organisations often are not willing or allowed to share their sensitive data with any external parties, thus making it challenging to build/train de… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: 11 pages

  5. Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure

    Authors: Dinusha Vatsalan, Raghav Bhaskar, Mohamed Ali Kaafar

    Abstract: Privacy-preserving estimation of counts of items in streaming data finds applications in several real-world scenarios including word auto-correction and traffic management applications. Recent works of RAPPOR and Apple's count-mean sketch (CMS) algorithm propose privacy preserving mechanisms for count estimation in large volumes of data using probabilistic data structures like counting Bloom filte… ▽ More

    Submitted 30 November, 2022; v1 submitted 10 August, 2022; originally announced August 2022.

    Comments: Version 2 14 pages, Accepted in IEEE Transactions on Data and Knowledge Engineering, 2022

  6. arXiv:2206.15089  [pdf, other

    cs.CR

    Fairness and Cost Constrained Privacy-Aware Record Linkage

    Authors: Nan Wu, Dinusha Vatsalan, Sunny Verma, Mohamed Ali Kaafar

    Abstract: Record linkage algorithms match and link records from different databases that refer to the same real-world entity based on direct and/or quasi-identifiers, such as name, address, age, and gender, available in the records. Since these identifiers generally contain personal identifiable information (PII) about the entities, record linkage algorithms need to be developed with privacy constraints. Kn… ▽ More

    Submitted 30 June, 2022; originally announced June 2022.

  7. arXiv:2205.06641  [pdf, other

    cs.CR

    Privacy Preserving Release of Mobile Sensor Data

    Authors: Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Mohamed Ali Kaafar

    Abstract: Sensors embedded in mobile smart devices can monitor users' activity with high accuracy to provide a variety of services to end-users ranging from precise geolocation, health monitoring, and handwritten word recognition. However, this involves the risk of accessing and potentially disclosing sensitive information of individuals to the apps that may lead to privacy breaches. In this paper, we aim t… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

    Comments: 12 pages, 10 figures, 1 table

  8. arXiv:2002.06856  [pdf, other

    cs.LG stat.ML

    Data and Model Dependencies of Membership Inference Attack

    Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari

    Abstract: Machine learning (ML) models have been shown to be vulnerable to Membership Inference Attacks (MIA), which infer the membership of a given data point in the target dataset by observing the prediction output of the ML model. While the key factors for the success of MIA have not yet been fully understood, existing defense mechanisms such as using L2 regularization \cite{10shokri2017membership} and d… ▽ More

    Submitted 25 July, 2020; v1 submitted 17 February, 2020; originally announced February 2020.

  9. arXiv:1911.12930  [pdf, ps, other

    cs.DB cs.DC

    Incremental Clustering Techniques for Multi-Party Privacy-Preserving Record Linkage

    Authors: Dinusha Vatsalan, Peter Christen, Erhard Rahm

    Abstract: Privacy-Preserving Record Linkage (PPRL) supports the integration of sensitive information from multiple datasets, in particular the privacy-preserving matching of records referring to the same entity. PPRL has gained much attention in many application areas, with the most prominent ones in the healthcare domain. PPRL techniques tackle this problem by conducting linkage on masked (encoded) values.… ▽ More

    Submitted 28 November, 2019; originally announced November 2019.

  10. arXiv:1701.01232  [pdf, ps, other

    cs.DB

    Scalable Multi-Database Privacy-Preserving Record Linkage using Counting Bloom Filters

    Authors: Dinusha Vatsalan, Peter Christen, Erhard Rahm

    Abstract: Privacy-preserving record linkage (PPRL) aims at integrating sensitive information from multiple disparate databases of different organizations. PPRL approaches are increasingly required in real-world application areas such as healthcare, national security, and business. Previous approaches have mostly focused on linking only two databases as well as the use of a dedicated linkage unit. Scaling PP… ▽ More

    Submitted 5 January, 2017; originally announced January 2017.

    Comments: This is an extended version of an article published in IEEE ICDM International Workshop on Privacy and Discrimination in Data Mining (PDDM) 2016 - Scalable privacy-preserving linking of multiple databases using counting Bloom filters

  11. arXiv:1612.08835  [pdf, ps, other

    cs.DB cs.CR

    Multi-Party Privacy-Preserving Record Linkage using Bloom Filters

    Authors: Dinusha Vatsalan, Peter Christen

    Abstract: Privacy-preserving record linkage (PPRL), the problem of identifying records that correspond to the same real-world entity across several data sources held by different parties without revealing any sensitive information about these records, is increasingly being required in many real-world application areas. Examples range from public health surveillance to crime and fraud detection, and national… ▽ More

    Submitted 28 December, 2016; originally announced December 2016.

    Comments: Extended version of the poster paper published in proceedings of ACM Conference in Information and Knowledge Management (CIKM) 2014 (http://dl.acm.org/citation.cfm?id=2661875)