1 code implementation • 13 Jan 2021 • Brian Lee, Brandi Dupervil, Nicholas P. Deputy, Wil Duck, Stephen Soroka, Lyndsay Bottichio, Benjamin Silk, Jason Price, Patricia Sweeney, Jennifer Fuld, Todd Weber, Dan Pollock
Practice Implications: Enriched understanding of the available public data, the methods used to create these data, and the algorithms used to protect privacy of de-identified individuals allow for improved data use.
Cryptography and Security Computers and Society