How Researchers De-Identify Data in Practice
Wentao Guo
34th USENIX Security Symposium (USENIX Security '25) · Day 2 · Usable Privacy and Security 2: Software and Experts
Wentao Guo
34th USENIX Security Symposium (USENIX Security '25) · Day 2 · Usable Privacy and Security 2: Software and Experts