In a post for the U.S. National Institute of Standards and Technology's Cybersecurity Insights blog, University of Vermont's Joseph Near and David Darais break down three threat models to consider when using differential privacy. Threat models are "what kind of adversaries we want the system to protect against," according to Near and Darais, who go on to detail the central differential privacy, local differential privacy and hybrid models.
Full Story
Comments
If you want to comment on this post, you need to login.