Optimizing the Privacy-Utility Balance using Synthetic Data and Configurable Perturbation Pipelines

Open in new window