Cargando…
Verification of De-Identification Techniques for Personal Information Using Tree-Based Methods with Shapley Values
With the development of big data and cloud computing technologies, the importance of pseudonym information has grown. However, the tools for verifying whether the de-identification methodology is correctly applied to ensure data confidentiality and usability are insufficient. This paper proposes a v...
Autores principales: | Lee, Junhak, Jeong, Jinwoo, Jung, Sungji, Moon, Jihoon, Rho, Seungmin |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8877642/ https://www.ncbi.nlm.nih.gov/pubmed/35207676 http://dx.doi.org/10.3390/jpm12020190 |
Ejemplares similares
-
The Shapley value: essays in honor of Lloyd S. Shapley
por: Roth, Alvin E
Publicado: (1988) -
The Shapley value of regression portfolios
por: Shalit, Haim
Publicado: (2020) -
Dynamic Shapley value and dynamic Nash bargaining
por: W, David
Publicado: (2018) -
An application of the Shapley value to the analysis of co-expression networks
por: Cesari, Giulia, et al.
Publicado: (2018) -
Explaining a series of models by propagating Shapley values
por: Chen, Hugh, et al.
Publicado: (2022)