top of page
TEAM
Database de-anonymization
Take a publicly available database which has been anonymized using an ad-hoc privacy method and attempt to de-anonymize it. Showcases the need for rigorous differential privacy algorithms.
bottom of page
Take a publicly available database which has been anonymized using an ad-hoc privacy method and attempt to de-anonymize it. Showcases the need for rigorous differential privacy algorithms.