Nuclearstar / K-AnonymityLinks
Anonymization methods for network security.
☆158Updated 3 months ago
Alternatives and similar repositories for K-Anonymity
Users that are interested in K-Anonymity are comparing it to the libraries listed below
Sorting:
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆174Updated last year
- Mondrian for L-diveristy. It's not available now.☆20Updated 6 years ago
- Evaluating variety of k-Anonymity techniques.☆55Updated last year
- Python package for simple implementations of state-of-the-art LDP frequency estimation algorithms. Contains code for our VLDB 2021 Paper.☆74Updated last year
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆40Updated 6 years ago
- ☆20Updated last year
- Sample LDP implementation in Python☆129Updated last year
- ☆43Updated 3 years ago
- Multiple Frequency Estimation Under Local Differential Privacy in Python☆48Updated last year
- An implementation of the tools described in the paper entitled "Graphical-model based estimation and inference for differential privacy"☆103Updated this week
- Implementation of "PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information"☆13Updated 2 years ago
- QGIS differential privacy processing plugin☆23Updated 9 years ago
- Differential private machine learning☆194Updated 3 years ago
- ☆315Updated 5 months ago
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆28Updated 4 years ago
- list of differential-privacy related resources☆312Updated 5 months ago
- Analytic calibration for differential privacy with Gaussian perturbations☆48Updated 6 years ago
- ☆14Updated 4 months ago
- Differential Privacy Preservation in Deep Learning under Model Attacks☆135Updated 4 years ago
- autodp: A flexible and easy-to-use package for differential privacy☆274Updated last year
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆135Updated 2 years ago
- A library for running membership inference attacks against ML models☆148Updated 2 years ago
- cluster based generalization for k-anonymity☆30Updated 6 years ago
- Useful tools for differential privacy☆216Updated 2 years ago
- Utility-aware synthesis of differentially private and attack-resilient location traces☆24Updated 6 years ago
- Tools and service for differentially private processing of tabular and relational data☆269Updated 5 months ago
- The Algorithmic Foundations of Differential Pivacy by Cynthia Dwork Chinese Translation☆164Updated 2 years ago
- GBDT learning + differential privacy. Standalone C++ implementation of "DPBoost" (Li et al.). There are further hardened & SGX versions o…☆8Updated 3 years ago
- ☆39Updated 2 years ago
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆35Updated 2 years ago