Login / Signup
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples.
Meng Chen
Li Lu
Jiadi Yu
Yingying Chen
Zhongjie Ba
Feng Lin
Kui Ren
Published in:
CoRR (2022)
Keyphrases
</>
differential privacy
privacy preserving
privacy requirements
personal information
data anonymization
key concepts
privacy preservation
databases
sensitive information
statistical databases
private information
security issues