no code implementations • 19 Oct 2022 • Julian Todt, Simon Hanisch, Thorsten Strufe
To mitigate this privacy risk, anonymization techniques employ transformations on clear data to obfuscate sensitive information, all while retaining some utility of the data.