Evaluating the Risk of Re-Identification in Data Release Strategies: An Attacker-Centric Approach.
Patrick MesanaPascal JutrasJulien CroweGregory VialGilles CaporossiPublished in: HICSS (2024)
Keyphrases
- data sets
- synthetic data
- data collection
- data processing
- raw data
- small number
- end users
- data sources
- high quality
- training data
- data analysis
- image data
- complex data
- network structure
- knowledge discovery
- data structure
- original data
- high throughput
- data acquisition
- historical data
- machine learning
- data distribution
- experimental data
- spatial data
- database
- data points