Location Privacy Protection System Based on K-Anonymous
☆25Mar 26, 2017Updated 9 years ago
Alternatives and similar repositories for Location-Privacy-Protection
Users that are interested in Location-Privacy-Protection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework for protecting worker location privacy in spatial crowdsourcing☆15Apr 7, 2016Updated 10 years ago
- Evaluation code for mobile crowdsourcing privacy (paper: On (The Lack Of) Location Privacy in Crowdsourcing Applications -- USENIX Securi…☆19Nov 25, 2020Updated 5 years ago
- code for 'Differential Location Privacy for Sparse Mobile Crowdsensing' at ICDM'16☆47Jan 19, 2017Updated 9 years ago
- Location Privacy Meter: A tool to model human mobility and quantify location privacy☆17May 25, 2021Updated 4 years ago
- cluster based generalization for k-anonymity☆30May 27, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Location Privacy Preservation of Vehicle Data in Internet of Vehicles☆10May 11, 2022Updated 3 years ago
- 本项目实现自《差分隐私下满足一致性的轨迹流量发布方法》,作者蔡剑平☆12Sep 2, 2019Updated 6 years ago
- Mondrian for L-diveristy. It's not available now.☆21May 27, 2019Updated 6 years ago
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆30Jan 31, 2021Updated 5 years ago
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆37Apr 27, 2023Updated 3 years ago
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆40Feb 28, 2019Updated 7 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆15Nov 25, 2023Updated 2 years ago
- Mitigating the Filter Bubble while Maintaining Relevance: Targeted Diversification with VAE-based Recommender Systems☆10Mar 15, 2023Updated 3 years ago
- trajectory mining tool function implement by python☆17Feb 29, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Optimal placement of uav through machine learning methods in 4G newtwork☆10May 11, 2020Updated 5 years ago
- Algorithm implementation, including ML, RL, OR.☆12Feb 22, 2022Updated 4 years ago
- K-Anonymity Simulator☆15Sep 19, 2017Updated 8 years ago
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆176Nov 30, 2023Updated 2 years ago
- LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection☆86Sep 2, 2024Updated last year
- A static DAG scheduling algorithm for heterogeneous systems using Mixed Integer Linear Programming . Implementation of "Optimization Tech…☆18Jun 19, 2013Updated 12 years ago
- 一个仿造QQ的聊天软件,目前已经实现了客户端和服务器的大体框架和基础功能,可扩展性良好,可在这之上进行二次开发。☆10Jan 6, 2021Updated 5 years ago
- SimpleRPCFramework是一款基于 Nacos 实现的 RPC 框架。网络传输实现了基于 Java 原生 Socket 版本,并且实现了多种序列化与负载均衡算法。☆12Feb 26, 2021Updated 5 years ago
- Edge computing system for mUAV crowd identification and monitoring.☆11Oct 30, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- k匿名☆19May 12, 2021Updated 4 years ago
- Supplementary material for the paper published at ACM RecSys 2021 and its extended version accepted to ACM TORS journal☆20Jan 28, 2023Updated 3 years ago
- Two multi-objective algorithms with multiple test function options☆12Apr 22, 2018Updated 8 years ago
- VibeGit, Track Interaction with Diffs in AI Coding☆23Oct 12, 2025Updated 6 months ago
- ☆22Sep 1, 2023Updated 2 years ago
- ☆11May 4, 2015Updated 10 years ago
- Repository for the EDBT'23 paper "Frequency Estimation of Evolving Data Under Local Differential Privacy".☆12Aug 1, 2023Updated 2 years ago
- [EACL'23] COVID-VTS: Fact Extraction and Verification on Short Video Platforms☆11Sep 26, 2023Updated 2 years ago
- 🎁🎄vue实现的将登陆、注册、短信验证、邮箱验证、忘记密码等等功能合并在一起的通用组件☆16Dec 8, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Logisim schematic for a CPU that implements the Brainfuck language.☆10Mar 9, 2018Updated 8 years ago
- ☆13May 8, 2021Updated 4 years ago
- Network Pruning That Matters: A Case Study on Retraining Variants (ICLR 2021)☆17Sep 19, 2021Updated 4 years ago
- GFIM: An novel algorithm of frequent item mining with local differential privacy☆12Feb 13, 2020Updated 6 years ago
- code for "Generative News Recommendation"☆15May 31, 2024Updated last year
- In-vehicle gateway intrusion detection based on ARM☆13Jan 26, 2021Updated 5 years ago
- Code for Canonne-Kamath-Steinke paper https://arxiv.org/abs/2004.00010☆64Jun 16, 2020Updated 5 years ago