Communication Obfuscation for Privacy and Utility against Obfuscation-Aware Eavesdroppers.
Andrew WintenbergStéphane LafortuneNecmiye OzayPublished in: ACC (2022)
Keyphrases
- reverse engineering
- data transformation
- static analysis
- differential privacy
- control flow
- malware detection
- privacy preserving
- privacy requirements
- utility function
- communication networks
- privacy preserving data mining
- information sharing
- database
- communication overhead
- private data
- neural network
- privacy preservation
- data privacy
- object oriented