Reasoning about obfuscated private information: who have lied and how to lie.
Xiangdong AnDawn N. JutlaNick CerconePublished in: WPES (2006)
Keyphrases
- private information
- privacy preserving
- personal information
- private data
- confidential data
- third party
- privacy protection
- reverse engineering
- sensitive information
- individual privacy
- privacy concerns
- privacy preservation
- preserving privacy
- privacy violations
- privacy breaches
- privacy requirements
- privacy preserving data mining
- input image
- social networks