April 24, 2024, 4:11 a.m. | T\^ania Carvalho, Nuno Moniz, Lu\'is Antunes, Nitesh Chawla

cs.CR updates on arXiv.org arxiv.org

arXiv:2212.00484v3 Announce Type: replace-cross
Abstract: Protecting user data privacy can be achieved via many methods, from statistical transformations to generative models. However, all of them have critical drawbacks. For example, creating a transformed data set using traditional techniques is highly time-consuming. Also, recent deep learning-based solutions require significant computational resources in addition to long training phases, and differentially private-based solutions may undermine data utility. In this paper, we propose $\epsilon$-PrivateSMOTE, a technique designed for safeguarding against re-identification and linkage attacks, …

addition arxiv can computational consuming control critical cs.cr cs.lg data data privacy deep learning generative generative models identification privacy private private data protecting re-identification resources risk solutions techniques user data

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Staff Firmware Engineer – Networking & Firewall

@ Axiado | Bengaluru, India

Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)

@ SAP | Walldorf, DE, 69190

SAP Security Administrator

@ FARO Technologies | EMEA-Portugal