L-Diversity explained

  Рет қаралды 9,467

Security and Privacy Academy

Security and Privacy Academy

Күн бұрын

Пікірлер: 9
@tonyaradzwachivandire1608
@tonyaradzwachivandire1608 11 ай бұрын
Thank you! I was failing to understand what "well represented values" meant concretely. This video cleared up the confusion!
@andybarbarian
@andybarbarian 6 ай бұрын
My prof gave an entire rambly 2h lecture on this topic and left me thoroughly confused. You explained it clearly in less than 4 minutes. Thank you so much! Subscribed and will now continue the playlist :D Btw, the database anonymization playlist has the fist two videos switched, this one should come after k-anonymity as you point out at the beginning ^^
@SecPrivAca
@SecPrivAca 6 ай бұрын
Thanks for the heads up! And glad you enjoyed the video.
@AndriiUshakov
@AndriiUshakov 4 ай бұрын
Hey, man, by any chance you do not study at the uni.lu? :)
@andybarbarian
@andybarbarian 4 ай бұрын
@@AndriiUshakov nah, unibe though ^^ just had my exam this week and went great thanks to this guy! you?
@SecPrivAca
@SecPrivAca 4 ай бұрын
@@AndriiUshakov No, I'm in Germany. But you probably meant Andy ;)
@MooseOnEarth
@MooseOnEarth Жыл бұрын
0:49 - The "red frame" for the quasi identifier should only cover the first two attributes (Age and ZIP). The third one (Disease) is the *sensitive* attribute and is not part of k-anonymity. This is an important distinction. In your videos attribute columns and columns with sensitive information could be colored differently in order to make this distinction.
@moazzammehmood9643
@moazzammehmood9643 Жыл бұрын
Isn't l-diversity used to overcome skewness attacks on p-sensitive, k-anonymity?
@SecPrivAca
@SecPrivAca Жыл бұрын
When L-diversity was introduced, it was directly addressed to overcome distribution issues in k-anonymous databases. The paper is available and relatively readable, if you're interested to know more: dl.acm.org/doi/pdf/10.1145/1217299.1217302?casa_token=T2ib53ZLitIAAAAA:Ftcww6ad8dz59oJmV7nOWFNLYTdgyorY2EGBJDFqylcnFJZszVygF1HxgPqdZwqVfY1yiMVrSlLNKw
t-closeness explained
7:10
Security and Privacy Academy
Рет қаралды 7 М.
Solving Wordle using information theory
30:38
3Blue1Brown
Рет қаралды 10 МЛН
2 MAGIC SECRETS @denismagicshow @roman_magic
00:32
MasomkaMagic
Рет қаралды 10 МЛН
Wait for it 😂
00:32
ILYA BORZOV
Рет қаралды 7 МЛН
Try Not To Laugh 😅 the Best of BoxtoxTv 👌
00:18
boxtoxtv
Рет қаралды 4,3 МЛН
How to whistle ?? 😱😱
00:31
Tibo InShape
Рет қаралды 21 МЛН
Information Theory Basics
16:22
Intelligent Systems Lab
Рет қаралды 67 М.
k-anonymity explained
3:49
Security and Privacy Academy
Рет қаралды 15 М.
ML Was Hard Until I Learned These 5 Secrets!
13:11
Boris Meinardus
Рет қаралды 331 М.
6 Verbal Tricks To Make An Aggressive Person Sorry
11:45
Charisma on Command
Рет қаралды 23 МЛН
Hashing Algorithms and Security - Computerphile
8:12
Computerphile
Рет қаралды 1,5 МЛН
Differential Privacy explained
5:40
Security and Privacy Academy
Рет қаралды 6 М.
Plagiarism Examples from Former Students
24:49
DrMarylynne
Рет қаралды 706 М.
2 MAGIC SECRETS @denismagicshow @roman_magic
00:32
MasomkaMagic
Рет қаралды 10 МЛН