VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Meng ChenLi LuJunhao WangJiadi YuYingying ChenZhibo WangZhongjie BaFeng LinKui RenPublished in: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. (2023)
Keyphrases
- differential privacy
- privacy requirements
- privacy preserving
- data anonymization
- private information
- data security
- utility function
- privacy preservation
- privacy guarantees
- disclosure risk
- personal information
- private data
- preserving privacy
- information loss
- security issues
- privacy preserving data mining
- location privacy
- privacy protection
- anonymized data
- security concerns
- multi agent
- individual privacy
- privacy enhancing
- database views
- data mining
- legal issues
- identity management
- privacy issues
- privacy concerns
- sensitive information
- data quality
- data collection
- decision trees