id author title date pages extension mime words sentences flesch summary cache txt work_kvhbk36tt5dizae424xy3neggq Khalil El-Khatib Privacy and Security in E-Learning 2003 15 .pdf application/pdf 15624 2096 77 Abstract— We consider group-based anonymization schemes,1 examples of group based anonymization are in Table I, adapted 82 2-diverse table: within each group the nonsensitive attribute86 values have been generalized following group-specific rules87 and nonsensitive values, given the anonymized table and, 141 attacker willing to learn from the released table can draw196 risks implied by publishing tables anonymized via group-based218 frequencies of the sensitive values in the anonymized table 1034 BOREALE et al.: RELATIVE PRIVACY THREATS AND LEARNING FROM ANONYMIZED DATA 15 BOREALE et al.: RELATIVE PRIVACY THREATS AND LEARNING FROM ANONYMIZED DATA 15 BOREALE et al.: RELATIVE PRIVACY THREATS AND LEARNING FROM ANONYMIZED DATA 15 BOREALE et al.: RELATIVE PRIVACY THREATS AND LEARNING FROM ANONYMIZED DATA 15 BOREALE et al.: RELATIVE PRIVACY THREATS AND LEARNING FROM ANONYMIZED DATA 15 BOREALE et al.: RELATIVE PRIVACY THREATS AND LEARNING FROM ANONYMIZED DATA 15 BOREALE et al.: RELATIVE PRIVACY THREATS AND LEARNING FROM ANONYMIZED DATA 15 ./cache/work_kvhbk36tt5dizae424xy3neggq.pdf ./txt/work_kvhbk36tt5dizae424xy3neggq.txt