Dec. 2, 2022, 2:10 a.m. | Tânia Carvalho, Nuno Moniz, Pedro Faria, Luís Antunes, Nitesh Chawla

cs.CR updates on arXiv.org arxiv.org

We can protect user data privacy via many approaches, such as statistical
transformation or generative models. However, each of them has critical
drawbacks. On the one hand, creating a transformed data set using conventional
techniques is highly time-consuming. On the other hand, in addition to long
training phases, recent deep learning-based solutions require significant
computational resources. In this paper, we propose PrivateSMOTE, a technique
designed for competitive effectiveness in protecting cases at maximum risk of
re-identification while requiring much less …

data information information sharing privacy sharing

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Systems Security Officer (ISSO) (Remote within HR Virginia area)

@ OneZero Solutions | Portsmouth, VA, USA

Security Analyst

@ UNDP | Tripoli (LBY), Libya

Senior Incident Response Consultant

@ Google | United Kingdom

Product Manager II, Threat Intelligence, Google Cloud

@ Google | Austin, TX, USA; Reston, VA, USA

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India