Login / Signup
Proving Differential Privacy with Shadow Execution.
Yuxin Wang
Zeyu Ding
Guanhong Wang
Daniel Kifer
Danfeng Zhang
Published in:
CoRR (2019)
Keyphrases
</>
differential privacy
differentially private
privacy preserving
private data
data sharing
privacy preserving data mining algorithms
privacy guarantees
tabular data
privacy preservation
anonymized data
personal information
data privacy
distributed data
search logs