Passive and active attackers in noiseless privacy.
Damien DesfontainesElisabeth KrahmerEsfandiar MohammadiPublished in: CoRR (2019)
Keyphrases
- noisy data
- privacy preserving
- personal information
- image processing
- privacy aware
- databases
- private information
- malicious attacks
- privacy preserving data mining
- private data
- database views
- real time
- legal issues
- ethical issues
- location privacy
- personal data
- security issues
- statistical databases
- sensitive information
- data collection