**3. Attacks against privacy**

In this section, the common types of attacks that lead to the development of the methods given above and lead to privacy violations are summarized [6].

#### **3.1 Semantic similarity attacks**

Attacks that are made by making use of the intuitive similarity of sensitive attribute values within anonymous groups.

In this case, it is not sufficient for the sensitive attribute values to be different from each other in terms of protecting privacy [40]. This attack can be prevented by calculating the similarities of sensitive attributes in the same anonymous group and by providing solutions to include similar sensitive attribute values in different groups.
