Login / Signup
Implementing the Exponential Mechanism with Base-2 Differential Privacy.
Christina Ilvento
Published in:
CCS (2020)
Keyphrases
</>
differential privacy
differentially private
privacy guarantees
private data
privacy preserving
privacy preserving data mining algorithms
tabular data
privacy preservation
data sharing
data privacy
databases
anonymized data
data mining
information retrieval systems
information sharing
personal information