Step 3: Other privacy-preserving techniques

Many privacy attacks rely on the fact that many models overfit to the training data, and leverage this property to extract personal information. It is therefore important to ensure the models do not overfit. Besides many of the techniques for reducing features, you can refer to the roadmap for improving generalization.

Last updated