Microdata Protection through Noise Addition
Inference Control in Statistical Databases, From Theory to Practice
Transforming data to satisfy privacy constraints
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Message Understanding Conference-6: a brief history
COLING '96 Proceedings of the 16th conference on Computational linguistics - Volume 1
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation
Data Mining and Knowledge Discovery
Introduction to the CoNLL-2002 shared task: language-independent named entity recognition
COLING-02 proceedings of the 6th conference on Natural language learning - Volume 20
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
A Survey of Web Information Extraction Systems
IEEE Transactions on Knowledge and Data Engineering
Towards optimal k-anonymization
Data & Knowledge Engineering
Introduction to Information Retrieval
Introduction to Information Retrieval
Constrained Microaggregation: Adding Constraints for Data Editing
Transactions on Data Privacy
Ontology-based anonymization of categorical values
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Towards semantic microaggregation of categorical data for confidential documents
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Preventing automatic user profiling in Web 2.0 applications
Knowledge-Based Systems
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Using profiling techniques to protect the user's privacy in twitter
MDAI'12 Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence
Detecting sensitive information from textual documents: an information-theoretic approach
MDAI'12 Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence
An automatic approach for ontology-based feature extraction from heterogeneous textualresources
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
We introduce the anonymization of unstructured documents to settle the base of automatic declassification of confidential documents. Departing from known ideas and methods of data privacy, we introduce the main issues of unstructured document anonymization and propose the use of named entity recognition techniques from natural language processing and information extraction to identify the entities of the document that need to be protected.