no code implementations • 31 Mar 2024 • Abdallah Alshantti, Adil Rasheed, Frank Westad
In doing so we also consider the situation for which re-identification attacks are formulated as reconstruction attacks, i. e., the situation where an attacker uses evolutionary multi-objective optimisation for perturbing synthetic samples closer to the training space.
1 code implementation • 1 Jul 2023 • Abdallah Alshantti, Damiano Varagnolo, Adil Rasheed, Aria Rahmati, Frank Westad
In this work, we design a cascaded tabular GAN framework (CasTGAN) for generating realistic tabular data with a specific focus on the validity of the output.