Step 3: Other privacy-preserving techniques
Last updated
Last updated
Many privacy attacks rely on the fact that many models overfit to the training data, and leverage this property to extract personal information. It is therefore important to ensure the models do not overfit. Besides many of the techniques for , you can refer to the roadmap for.