Login / Signup
AnonTokens: tracing re-identification attacks through decoy records.
Spiros Antonatos
Stefano Braghin
Naoise Holohan
Pol Mac Aonghusa
Published in:
CoRR (2019)
Keyphrases
</>
countermeasures
automatic identification
database
multiscale
cooperative
malicious attacks
chosen plaintext
databases
neural network
information systems
security protocols
terrorist attacks