Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Information sensitivity

Known as: Sensitivity (information), Sensitive information, Sensitivity indicator 
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2010
Highly Cited
2010
Reluctance to provide personal health information could impede the success of web-based healthcare services. This paper focuses… Expand
Review
2010
Review
2010
The collection of digital information by governments, corporations, and individuals has created tremendous opportunities for… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Highly Cited
2009
Highly Cited
2009
Operators of online social networks are increasingly sharing potentially sensitive information about users and their… Expand
  • figure 1
  • figure 4
  • figure 2
  • figure 3
Highly Cited
2008
Highly Cited
2008
We present a new class of statistical de- anonymization attacks against high-dimensional micro-data, such as individual… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2006
Highly Cited
2006
We continue a line of research initiated in [10, 11] on privacy-preserving statistical databases. Consider a trusted server that… Expand
Highly Cited
2006
Highly Cited
2006
Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2006
Highly Cited
2006
Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a… Expand
Highly Cited
2002
Highly Cited
2002
The ability of attackers to rapidly gain control of vast numbers of Internet hosts poses an immense risk to the overall security… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1978
Highly Cited
1978
Encryption is a well—known technique for preserving the privacy of sensitive information. One of the basic, apparently inherent… Expand
  • figure 2