Location Privacy Protection System Based on K-Anonymous
☆25Mar 26, 2017Updated 9 years ago
Alternatives and similar repositories for Location-Privacy-Protection
Users that are interested in Location-Privacy-Protection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- De-anonymization algorithm of mobility trajectories☆32Mar 3, 2018Updated 8 years ago
- A framework for protecting worker location privacy in spatial crowdsourcing☆15Apr 7, 2016Updated 10 years ago
- Evaluation code for mobile crowdsourcing privacy (paper: On (The Lack Of) Location Privacy in Crowdsourcing Applications -- USENIX Securi…☆19Nov 25, 2020Updated 5 years ago
- code for 'Differential Location Privacy for Sparse Mobile Crowdsensing' at ICDM'16☆47Jan 19, 2017Updated 9 years ago
- Privacy Protection Application (PPA): Code and instructions for building two tools for processing vehicle trip, or trajectory, data to pr…☆13Oct 8, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Location Privacy Meter: A tool to model human mobility and quantify location privacy☆17May 25, 2021Updated 4 years ago
- Location Privacy Preservation of Vehicle Data in Internet of Vehicles☆10May 11, 2022Updated 4 years ago
- 数据隐私k匿名,samarati算法和mondrian算法的Python3实现。☆18Apr 26, 2022Updated 4 years ago
- 本项目实现自《差分隐私下满足一致性的轨迹流量发布方法》,作者蔡剑平☆12Sep 2, 2019Updated 6 years ago
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆30Jan 31, 2021Updated 5 years ago
- 本科毕设时的代码,用于k匿名栅格化位置隐私保护“群智背景下”☆10Oct 11, 2018Updated 7 years ago
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆37Apr 27, 2023Updated 3 years ago
- 构建一个加密图像检索系统,通过使用深度学习算法对存储的图像进行分类和标记,并以此作为图 像检索的依据,并设计一个检索算法,进而提高加密图像检索的准确性和效率。该算法主要运行在图像检索服务器端。 框架:Pytorch☆15Dec 8, 2022Updated 3 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆15Nov 25, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 关于2019和2018年的一些东西☆28Nov 9, 2019Updated 6 years ago
- trajectory mining tool function implement by python☆17Feb 29, 2020Updated 6 years ago
- Optimal placement of uav through machine learning methods in 4G newtwork☆10May 11, 2020Updated 6 years ago
- Anonymization methods for network security.☆165Mar 2, 2025Updated last year
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆176Nov 30, 2023Updated 2 years ago
- LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection☆86Sep 2, 2024Updated last year
- 一个仿造QQ的聊天软件,目前已经实现了客户端和服务器的大体框架和基础功能,可扩展性良好,可在这之上进行二次开发。☆10Jan 6, 2021Updated 5 years ago
- SimpleRPCFramework是一款基于 Nacos 实现的 RPC 框架。网络传输实现了基于 Java 原生 Socket 版本,并且实现了多种序列化与负载均衡算法。☆12Feb 26, 2021Updated 5 years ago
- Edge computing system for mUAV crowd identification and monitoring.☆11Oct 30, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- k匿名☆19May 12, 2021Updated 5 years ago
- Supplementary material for the paper published at ACM RecSys 2021 and its extended version accepted to ACM TORS journal☆20Jan 28, 2023Updated 3 years ago
- ☆20Oct 27, 2023Updated 2 years ago
- Repository for the EDBT'23 paper "Frequency Estimation of Evolving Data Under Local Differential Privacy".☆12Aug 1, 2023Updated 2 years ago
- A Logisim schematic for a CPU that implements the Brainfuck language.☆10Mar 9, 2018Updated 8 years ago
- ☆13May 8, 2021Updated 5 years ago
- Efficient UAV placement to serve maximum users through minimum UAVs☆14Feb 14, 2025Updated last year
- GFIM: An novel algorithm of frequent item mining with local differential privacy☆12Feb 13, 2020Updated 6 years ago
- Training Sequential Recommenders as Discriminators (SIGIR'22)☆15Jul 25, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Claude Code 是一款革命性的 AI 编程助手,具有以下特点: ⚡ 快速响应 - 秒级生成代码和解决方案 🎯 精准理解 - 准确理解开发需求和意图 💪 强大功能 - 支持代码生成、重构、调试等多种场景 🌏 国内可用 - 通过镜像站无需魔法即可使用☆29Mar 29, 2026Updated last month
- In-vehicle gateway intrusion detection based on ARM☆13Jan 26, 2021Updated 5 years ago
- Code for Canonne-Kamath-Steinke paper https://arxiv.org/abs/2004.00010☆64Jun 16, 2020Updated 5 years ago
- ☆10Apr 27, 2021Updated 5 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 4 years ago
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 3 years ago
- A demo for hyperledger fabric node SDK☆15Sep 26, 2018Updated 7 years ago