Login / Signup
Implementing the Exponential Mechanism with Base-2 Differential Privacy.
Christina Ilvento
Published in:
CoRR (2019)
Keyphrases
</>
differential privacy
differentially private
privacy guarantees
privacy preserving
private data
privacy preservation
data sharing
data privacy
tabular data
privacy preserving data mining algorithms
anonymized data
databases
data mining
data quality