Login / Signup
How Much Is Enough? Choosing ε for Differential Privacy.
Jaewoo Lee
Chris Clifton
Published in:
ISC (2011)
Keyphrases
</>
differential privacy
differentially private
privacy preserving
private data
privacy guarantees
privacy preserving data mining algorithms
privacy preservation
data sharing
tabular data
personal information
data privacy
anonymized data
data sets
co occurrence
website
information retrieval
data mining
databases