• Home
  • Universidad de Cádiz
  • Department of Automation Engineering, Electronics, and Computer Architecture
  • Mercedes Rodriguez-Garcia
Mercedes Rodriguez-Garcia

Mercedes Rodriguez-Garcia
  • Universidad de Cádiz

About

18
Publications
1,767
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
133
Citations
Current institution
Universidad de Cádiz

Publications

Publications (18)
Article
Full-text available
This paper explores the limitations faced by current solutions for selecting quasi-identifying attributes in the context of Privacy-Preserving Data Publishing (PPDP). PPDP stipulates that any published personal data should not be linkable to other available data sources in a manner that could potentially lead to individual re-identification or comp...
Conference Paper
Full-text available
The diversity of information sources available to educational institutions makes it necessary to mash up information in order to get the highest performance through learning analytics. Data mashup requires the implementation of data anonymisation methods in order to protect the privacy of the learners who appear in the data partitions. However, the...
Article
Full-text available
Lecturers are often reluctant to set examinations online because of the potential problems of fraudulent behaviour from their students. This concern has increased during the coronavirus pandemic because courses that were previously designed to be taken face-to-face have to be conducted online. The courses have had to be redesigned, including semina...
Article
Full-text available
Virtual learning environments contain valuable data about students that can be correlated and analyzed to optimize learning. Modern learning environments based on data mashups that collect and integrate data from multiple sources are relevant for learning analytics systems because they provide insights into students’ learning. However, data sets in...
Article
Full-text available
Querying a search engine is one of the most frequent activities performed by Internet users. As queries are submitted, the server collects and aggregates them to build detailed user profiles. While user profiles are used to offer personalized search services, they may also be employed in behavioral targeting or, even worse, be transferred to third...
Article
Full-text available
Sharing patient datasets curated by health institutions is critical for the advance of monitoring, surveillance and research. However, patient data is sensitive data and it can only be released under certain conditions and with previous explicit consent. Privacy preserving data sharing provides techniques to distribute datasets minimizing the risk...
Article
Full-text available
This paper aims to advance the field of data anonymization within the context of Internet of Things (IoT), an environment where data collected may contain sensitive information about users. Specifically, we propose a privacy-preserving data publishing alternative that extends the privacy requirement to the data collection phase. Because our proposa...
Article
Full-text available
Personal data are of great interest for research but, at the same time, they pose a serious privacy risk. Therefore, appropriate data protection measures should be undertaken by the data controller before making personal data available for secondary use. Also, such data protection should be done in a way that data are still useful for analysis. In...
Article
Full-text available
Query logs are of great interest for data analysis. They allow characterizing user profiles, user behaviors and search habits. However, since query logs usually contain personal information, data controllers should implement appropriate data protection mechanisms before releasing them for secondary use. In the past, the anonymization of query logs...
Article
Full-text available
Noise addition is a data distortion technique widely used in data intensive applications. For example, in machine learning tasks it helps to reduce overfitting, whereas in data privacy protection it adds uncertainty to personally identifiable information. Yet, due to its mathematical operating principle, noise addition is a method mainly intended f...
Conference Paper
Full-text available
Many of the potentially sensitive personal data produced and compiled in electronic sources are nominal and multi-attribute (e.g., personal interests, healthcare diagnoses, commercial transactions, etc.). For such data, which are discrete, finite and non-ordinal, privacy-protection methods should mask original values to prevent disclosure while pre...
Article
Understanding the interplay between myeloid dendritic cells and T cells under tolerogenic conditions, and whether their interactions induce the development of antigen-specific regulatory T cells (Tregs) is critical to uncover the mechanisms involved in the induction of indefinite allograft survival. Myeloid dendritic cell-T-cell interactions are se...

Network

Cited By