2022
DOI: 10.1007/978-3-031-19778-9_29
|View full text |Cite
|
Sign up to set email alerts
|

Decouple-and-Sample: Protecting Sensitive Information in Task Agnostic Data Release

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 40 publications
0
1
0
Order By: Relevance
“…Wu et al [28] proposed a constraint measure to minimize the spread of sensitive information and relied on the Bandit framework to adaptively execute the spread constraint measure. Singh et al [29] used local sampling to generate diferentially private sensitive information, generating useful representations while maintaining privacy. Gao et al [30] proposed a scheme through research that can audit the integrity of all encrypted cloud fles of keywords of interest to users by only providing encrypted keywords to TPA, while unable to infer sensitive information such as fles containing the keyword and the number of fles containing the keyword.…”
Section: Sensitive Information Identifcationmentioning
confidence: 99%
“…Wu et al [28] proposed a constraint measure to minimize the spread of sensitive information and relied on the Bandit framework to adaptively execute the spread constraint measure. Singh et al [29] used local sampling to generate diferentially private sensitive information, generating useful representations while maintaining privacy. Gao et al [30] proposed a scheme through research that can audit the integrity of all encrypted cloud fles of keywords of interest to users by only providing encrypted keywords to TPA, while unable to infer sensitive information such as fles containing the keyword and the number of fles containing the keyword.…”
Section: Sensitive Information Identifcationmentioning
confidence: 99%