Login / Signup

Shielded Representations: Protecting Sensitive Attributes Through Iterative Gradient-Based Projection.

Shadi IskanderKira RadinskyYonatan Belinkov
Published in: CoRR (2023)
Keyphrases
  • privacy preservation
  • sensitive attributes
  • evolutionary algorithm
  • access control
  • attribute values
  • fuzzy logic
  • sensitive data
  • data privacy