QGIS differential privacy processing plugin
☆23Mar 15, 2016Updated 10 years ago
Alternatives and similar repositories for differential_privacy
Users that are interested in differential_privacy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Evaluation code for mobile crowdsourcing privacy (paper: On (The Lack Of) Location Privacy in Crowdsourcing Applications -- USENIX Securi…☆19Nov 25, 2020Updated 5 years ago
- code for 'Differential Location Privacy for Sparse Mobile Crowdsensing' at ICDM'16☆47Jan 19, 2017Updated 9 years ago
- A Privacy Preserving Data Mining Platform☆46Jul 10, 2012Updated 13 years ago
- Naive implementation of basic Differential-Privacy framework and algorithms☆49Aug 30, 2022Updated 3 years ago
- An experimental neural cryptography algorithm created in 2016 that implements convolutional neural networks for cryptography based on oth…☆17Jul 26, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆45Jul 9, 2021Updated 4 years ago
- 本项目实现自《差分隐私下满足一致性的轨迹流量发布方法》,作者蔡剑平☆12Sep 2, 2019Updated 6 years ago
- Accompanying source code to my Bachelor's thesis at TUHH☆11Mar 15, 2018Updated 8 years ago
- Error Correction Codes - C☆11May 26, 2019Updated 6 years ago
- Evaluating variety of k-Anonymity techniques.☆55Sep 21, 2023Updated 2 years ago
- A Performance Analysis and Simulation of BCH Code in Matlab☆13Feb 26, 2022Updated 4 years ago
- 📄 Technical documentation: https://cros.ec.europa.eu/book-page/software-codes-and-documentation☆16Jun 9, 2025Updated 9 months ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 4 years ago
- ☆13May 30, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- TKDE'23: A Survey and Experimental Study on Privacy-Preserving Trajectory Data Publishing☆12May 5, 2023Updated 2 years ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- Python package to create a report for mobility data with differential privacy guarantees.☆15Sep 18, 2024Updated last year
- Diffprivlib: The IBM Differential Privacy Library☆909Sep 17, 2025Updated 6 months ago
- ☆18Oct 16, 2025Updated 5 months ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- ☆10Jan 18, 2022Updated 4 years ago
- SKNNS (Secure K-Nearest Neighbor Scheme) model is a secure scheme for implementing a whole structure of the privacy preserving k-NN algor…☆11Apr 9, 2017Updated 8 years ago
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆17Oct 14, 2025Updated 5 months ago
- ☆13May 16, 2016Updated 9 years ago
- Python code for inserting a watermark in the host image using Discrete Wavelet Transform and Singular Value Decomposition☆20May 14, 2019Updated 6 years ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Secure Computation Library☆17Aug 28, 2017Updated 8 years ago
- ☆11May 4, 2015Updated 10 years ago
- Reconstruction Attack on Differential Private Trajectory Protection Mechanisms☆16Oct 3, 2024Updated last year
- AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. I…☆11Nov 21, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15Dec 9, 2020Updated 5 years ago
- This is the Python implementation of DIANA Clustering Algorithm☆14Mar 31, 2018Updated 7 years ago
- A Logisim schematic for a CPU that implements the Brainfuck language.☆10Mar 9, 2018Updated 8 years ago
- Hadamard Response: Communication efficient, sample optimal, linear time locally private learning of distributions☆16Sep 18, 2020Updated 5 years ago
- Differentially Private Clustering in High-Dimensional Euclidean Spaces☆12Dec 30, 2017Updated 8 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Pure Python Paillier Homomorphic Cryptosystem☆135Oct 17, 2018Updated 7 years ago