top of page
TEAM
Database de-anonymization

Take a publicly available database which has been anonymized using an ad-hoc privacy method and attempt to de-anonymize it. Showcases the need for rigorous differential privacy algorithms.








bottom of page
Take a publicly available database which has been anonymized using an ad-hoc privacy method and attempt to de-anonymize it. Showcases the need for rigorous differential privacy algorithms.