Aug. 12, 2022, 1:20 a.m. | Bo Chen, Kevin Leahy, Austin Jones, Matthew Hale

cs.CR updates on arXiv.org arxiv.org

Data-driven systems are gathering increasing amounts of data from users, and
sensitive user data requires privacy protections. In some cases, the data
gathered is non-numerical or symbolic, and conventional approaches to privacy,
e.g., adding noise, do not apply, though such systems still require privacy
protections. Accordingly, we present a novel differential privacy framework for
protecting trajectories generated by symbolic systems. These trajectories can
be represented as words or strings over a finite alphabet. We develop new
differential privacy mechanisms that …

application differential privacy privacy systems

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Team Lead, Security Operations Center, Cyber Risk

@ Kroll | United Kingdom

Cyber Security Risk Analyst

@ College Board | Remote - Virginia

Lead - IT Security Engineer

@ Bosch Group | BENGALURU, India

Project Cybersecurity Manager

@ Alstom | Bengaluru, KA, IN

Security Consultant

@ CloudSEK | Bengaluru, Karnataka, India