no code implementations • 31 Mar 2022 • Anna Antoniou, Giacomo Dossena, Julia MacMillan, Steven Hamblin, David Clifton, Paula Petrone
The objective of this work is to calculate the risk of re-identification arising from a malicious attack to an anonymised dataset, as described below.