Location Privacy Protection System Based on K-Anonymous
☆25Mar 26, 2017Updated 9 years ago
Alternatives and similar repositories for Location-Privacy-Protection
Users that are interested in Location-Privacy-Protection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework for protecting worker location privacy in spatial crowdsourcing☆15Apr 7, 2016Updated 10 years ago
- A Leaflet-based interface for selecting a "blurred" or low-resolution location, to preserve privacy☆35Aug 17, 2021Updated 4 years ago
- Privacy Protection Application (PPA): Code and instructions for building two tools for processing vehicle trip, or trajectory, data to pr…☆13Oct 8, 2018Updated 7 years ago
- Location Privacy Meter: A tool to model human mobility and quantify location privacy☆17May 25, 2021Updated 4 years ago
- A library to display points which have been "blurred" for privacy with leaflet-blurred-location☆11Jan 11, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- cluster based generalization for k-anonymity☆30May 27, 2019Updated 6 years ago
- Location Privacy Preservation of Vehicle Data in Internet of Vehicles☆10May 11, 2022Updated 3 years ago
- 数据隐私k匿名,samarati算法和mondrian算法的Python3实现。☆18Apr 26, 2022Updated 3 years ago
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆29Jan 31, 2021Updated 5 years ago
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆40Feb 28, 2019Updated 7 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Nov 25, 2023Updated 2 years ago
- Physics-Informed Reinforcement Learning for Smart V2G EV Charging and Distribution Network Voltage Support.☆31Oct 16, 2025Updated 5 months ago
- ☆13Mar 18, 2026Updated 3 weeks ago
- Mitigating the Filter Bubble while Maintaining Relevance: Targeted Diversification with VAE-based Recommender Systems☆10Mar 15, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- trajectory mining tool function implement by python☆17Feb 29, 2020Updated 6 years ago
- 一种基于MAE人脸隐私保护方法的身份认证系统☆14Jul 31, 2022Updated 3 years ago
- Optimal placement of uav through machine learning methods in 4G newtwork☆10May 11, 2020Updated 5 years ago
- 这是我个人的本科毕业设计项目,总体上不是特别成熟。但对MOT和边缘计算的发展可能有非常微小的启发意义,欢迎交流!☆10Aug 16, 2022Updated 3 years ago
- Edge computing system for mUAV crowd identification and monitoring.☆11Oct 30, 2021Updated 4 years ago
- Supplementary material for the paper published at ACM RecSys 2021 and its extended version accepted to ACM TORS journal☆20Jan 28, 2023Updated 3 years ago
- Two multi-objective algorithms with multiple test function options☆12Apr 22, 2018Updated 7 years ago
- Repository for the EDBT'23 paper "Frequency Estimation of Evolving Data Under Local Differential Privacy".☆12Aug 1, 2023Updated 2 years ago
- [EACL'23] COVID-VTS: Fact Extraction and Verification on Short Video Platforms☆11Sep 26, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13May 8, 2021Updated 4 years ago
- Efficient UAV placement to serve maximum users through minimum UAVs☆14Feb 14, 2025Updated last year
- GFIM: An novel algorithm of frequent item mining with local differential privacy☆12Feb 13, 2020Updated 6 years ago
- In-vehicle gateway intrusion detection based on ARM☆13Jan 26, 2021Updated 5 years ago
- A general code base to formulate and solve unbalanced optimal power flow (OPF) problems written in MATLAB.☆24Jan 3, 2020Updated 6 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 3 years ago
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 3 years ago
- Bridging Items and Language: A Transition Paradigm for Large Language Model-Based Recommendation (KDD'24)☆23Aug 1, 2024Updated last year
- The implementations of paper "Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment"☆14Dec 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆21May 21, 2021Updated 4 years ago
- 个人博客后端☆15Jun 24, 2020Updated 5 years ago
- 基于 Spring Security 6 的 RBAC 权限系统,支持 URL 及按钮级控制,匹配 Ant 路径。依赖 MySQL+Redis,文件存储可选 Minio/本地/第三方OSS等。☆16Nov 16, 2025Updated 4 months ago
- ☆18Feb 5, 2025Updated last year
- Variational Inequality Solvers in Python☆26Jun 2, 2018Updated 7 years ago
- OpenCore EFI for b760m/i5-13400f/rx6600☆16Jun 18, 2023Updated 2 years ago
- UCLANesl - NIST Differential Privacy Challenge (Match 3)☆25May 30, 2019Updated 6 years ago