- De-identification / anonymizaion / removing PII
- Re-identification: Linkage attacks / auxiliary information attacks
- Definition
- Challenges (utility & computational)
- Attacks: Homogeneity attack, Auxiliary data attack
- Definition
- Sequential composition
- Parallel composition
- Post-processing
- Analyzing the privacy cost of programs
- Sensitivity of real-valued functions
- L1 / L2 sensitivity of vector-valued functions
- Sensitivity of various functions (count, sum, mean, histograms)
- Definition
- Gaussian mechanism
- Advanced composition
- Advantages and disadvantages (e.g. failure probability)