2019
DOI: 10.48550/arxiv.1902.00329
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Privacy Against Brute-Force Inference Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…In general, privacy and utility objectives compete with each other, making the design of privacy mechanisms a non-trivial task. When data privacy and statistical utility are measured using information-theoretic quantities (e.g., mutual information), most methods for the analysis and design of privacy mechanisms rely on the implicit assumption that the data distribution is, for the most part, known [10,14,[18][19][20][21][22][23][24][25]. In practice, the designer has access only to a sample from the true distribution.…”
Section: Introductionmentioning
confidence: 99%
“…In general, privacy and utility objectives compete with each other, making the design of privacy mechanisms a non-trivial task. When data privacy and statistical utility are measured using information-theoretic quantities (e.g., mutual information), most methods for the analysis and design of privacy mechanisms rely on the implicit assumption that the data distribution is, for the most part, known [10,14,[18][19][20][21][22][23][24][25]. In practice, the designer has access only to a sample from the true distribution.…”
Section: Introductionmentioning
confidence: 99%