Sign in

Calculating bounds on information leakage using two-bit patterns.

Ziyuan MengGeoffrey Smith
Published in: PLAS (2011)
Keyphrases
  • information leakage
  • data mining techniques
  • personal information
  • social networks
  • gray level