Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion.
Kousha KalantariLalitha SankarAnand D. SarwatePublished in: IEEE Trans. Inf. Forensics Secur. (2018)
Keyphrases
- differential privacy
- differentially private
- privacy preserving
- private data
- privacy guarantees
- tabular data
- anonymized data
- individual privacy
- privacy preservation
- personal information
- data sharing
- privacy preserving data mining algorithms
- preserving privacy
- databases
- social network data
- data access
- data privacy
- search logs
- privacy preserving data mining
- language model