Keinang / K-Anonymity
K-Anonymity Simulator
☆15Updated 7 years ago
Alternatives and similar repositories for K-Anonymity:
Users that are interested in K-Anonymity are comparing it to the libraries listed below
- cluster based generalization for k-anonymity☆29Updated 5 years ago
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆173Updated last year
- Mondrian for L-diveristy. It's not available now.☆19Updated 5 years ago
- Code for NIPS'2017 paper☆50Updated 4 years ago
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆35Updated last year
- Anonymization methods for network security.☆157Updated last month
- A Privacy Preserving Data Mining Platform☆46Updated 12 years ago
- Naive implementation of basic Differential-Privacy framework and algorithms☆48Updated 2 years ago
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆39Updated 6 years ago
- ☆43Updated 3 years ago
- Differential Privacy Preservation in Deep Learning under Model Attacks☆134Updated 4 years ago
- list of differential-privacy related resources☆308Updated 3 months ago
- ConTPL: Controlling Temporal Privacy Leakage in Streaming Data Release with Differential Privacy☆10Updated 6 years ago
- QGIS differential privacy processing plugin☆22Updated 9 years ago
- Source code of paper "Differentially Private Generative Adversarial Network"☆69Updated 6 years ago
- This work combines differential privacy and multi-party computation protocol to achieve distributed machine learning.☆26Updated 4 years ago
- UCLANesl - NIST Differential Privacy Challenge (Match 3)☆24Updated 5 years ago
- Differentially private learning on distributed data (NIPS 2017)☆12Updated 7 years ago
- Differential private machine learning☆191Updated 3 years ago
- Location Privacy Meter: A tool to model human mobility and quantify location privacy☆16Updated 3 years ago
- 关于2019和2018年的一些东西☆28Updated 5 years ago
- Quantifying Differential Privacy under Temporal Correlations☆12Updated last year
- Privacy-preserving generative deep neural networks support clinical data sharing☆105Updated 6 years ago
- Sample LDP implementation in Python☆125Updated last year
- Top_Down_Greedy_Anonymization is a Top-down greedy algorithm data anonymization algorithm for relational dataset, proposed by Jian Xu in …☆10Updated 9 years ago
- This project is about applying k-anonymity principle to tables of relational data. Later on, the centralized algorithms will be modified …☆12Updated 12 years ago
- Useful tools for differential privacy☆216Updated 2 years ago
- Diffprivlib: The IBM Differential Privacy Library☆862Updated 2 weeks ago
- Implementation of the peer-to-peer simulation used for the experimental evaluation of the Heterogeneous Differential Privacy paper.☆10Updated 4 years ago
- Accompanying source code to my Bachelor's thesis at TUHH☆11Updated 7 years ago