Location Privacy Protection System Based on K-Anonymous
☆25Mar 26, 2017Updated 8 years ago
Alternatives and similar repositories for Location-Privacy-Protection
Users that are interested in Location-Privacy-Protection are comparing it to the libraries listed below
Sorting:
- De-anonymization algorithm of mobility trajectories☆32Mar 3, 2018Updated 8 years ago
- Evaluation code for mobile crowdsourcing privacy (paper: On (The Lack Of) Location Privacy in Crowdsourcing Applications -- USENIX Securi…☆19Nov 25, 2020Updated 5 years ago
- code for 'Differential Location Privacy for Sparse Mobile Crowdsensing' at ICDM'16☆47Jan 19, 2017Updated 9 years ago
- A Leaflet-based interface for selecting a "blurred" or low-resolution location, to preserve privacy☆35Aug 17, 2021Updated 4 years ago
- Privacy Protection Application (PPA): Code and instructions for building two tools for processing vehicle trip, or trajectory, data to pr…☆13Oct 8, 2018Updated 7 years ago
- Location Privacy Meter: A tool to model human mobility and quantify location privacy☆17May 25, 2021Updated 4 years ago
- Location Privacy Preservation of Vehicle Data in Internet of Vehicles☆10May 11, 2022Updated 3 years ago
- 数据隐私k匿名,samarati算法和mondrian算法的Python3实现。☆18Apr 26, 2022Updated 3 years ago
- Mondrian for L-diveristy. It's not available now.☆20May 27, 2019Updated 6 years ago
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆29Jan 31, 2021Updated 5 years ago
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆40Feb 28, 2019Updated 7 years ago
- Preference-Aware Task Assignment in On-Demand Taxi Dispatching: An Online Stable Matching Approach☆13Apr 4, 2020Updated 5 years ago
- 关于2019和2018年的一些东西☆28Nov 9, 2019Updated 6 years ago
- Mitigating the Filter Bubble while Maintaining Relevance: Targeted Diversification with VAE-based Recommender Systems☆10Mar 15, 2023Updated 3 years ago
- trajectory mining tool function implement by python☆17Feb 29, 2020Updated 6 years ago
- Implementation and Simulation of a Vehicular Ad-Hoc Network in an urban scenario using Omnet++ 5.0, SUMO 0.25 and Veins 4.4.☆13May 24, 2022Updated 3 years ago
- Optimal placement of uav through machine learning methods in 4G newtwork☆10May 11, 2020Updated 5 years ago
- Algorithm implementation, including ML, RL, OR.☆12Feb 22, 2022Updated 4 years ago
- Anonymization methods for network security.☆164Mar 2, 2025Updated last year
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆175Nov 30, 2023Updated 2 years ago
- LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection☆87Sep 2, 2024Updated last year
- A static DAG scheduling algorithm for heterogeneous systems using Mixed Integer Linear Programming . Implementation of "Optimization Tech…☆18Jun 19, 2013Updated 12 years ago
- 这是我个人的本科毕业设计项目,总体上不是特别成熟。但对MOT和边缘计算的发展可能有非常微小的启发意义,欢迎交流!☆10Aug 16, 2022Updated 3 years ago
- 一个仿造QQ的聊天软件,目前已经实现了客户端和服务器的大体框架和基础功能,可扩展性良好,可在这之上进行二次开发。☆10Jan 6, 2021Updated 5 years ago
- SimpleRPCFramework是一款基于 Nacos 实现的 RPC 框架。网络传输实现了基于 Java 原生 Socket 版本,并且实现了多种序列化与负载均衡算法。☆12Feb 26, 2021Updated 5 years ago
- Edge computing system for mUAV crowd identification and monitoring.☆11Oct 30, 2021Updated 4 years ago
- Supplementary material for the paper published at ACM RecSys 2021 and its extended version accepted to ACM TORS journal☆20Jan 28, 2023Updated 3 years ago
- Two multi-objective algorithms with multiple test function options☆12Apr 22, 2018Updated 7 years ago
- ☆11May 4, 2015Updated 10 years ago
- Repository for the EDBT'23 paper "Frequency Estimation of Evolving Data Under Local Differential Privacy".☆12Aug 1, 2023Updated 2 years ago
- [EACL'23] COVID-VTS: Fact Extraction and Verification on Short Video Platforms☆11Sep 26, 2023Updated 2 years ago
- A Logisim schematic for a CPU that implements the Brainfuck language.☆10Mar 9, 2018Updated 8 years ago
- FANC is a tool for the proof transfer of incomplete verification☆12Mar 20, 2022Updated 4 years ago
- ☆13May 8, 2021Updated 4 years ago
- GFIM: An novel algorithm of frequent item mining with local differential privacy☆12Feb 13, 2020Updated 6 years ago
- Network Pruning That Matters: A Case Study on Retraining Variants (ICLR 2021)☆17Sep 19, 2021Updated 4 years ago
- code for "Generative News Recommendation"☆15May 31, 2024Updated last year
- Claude Code 是一款革命性的 AI 编程助手,具有以下特点: ⚡ 快速响应 - 秒级生成代码和解决方案 🎯 精准理解 - 准确理解开发需求和意图 💪 强大功能 - 支持代码生成、重构、调试等多种场景 🌏 国内可用 - 通过镜像站无需魔法即可使用☆21Oct 16, 2025Updated 5 months ago
- In-vehicle gateway intrusion detection based on ARM☆13Jan 26, 2021Updated 5 years ago