Differential privacy protection based on Diffle-Hellman Key Exchange and AES256.
☆10May 10, 2015Updated 10 years ago
Alternatives and similar repositories for DifferentialPrivacy
Users that are interested in DifferentialPrivacy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project is about applying k-anonymity principle to tables of relational data. Later on, the centralized algorithms will be modified …☆12Feb 12, 2013Updated 13 years ago
- K-Anonymity Simulator☆15Sep 19, 2017Updated 8 years ago
- Implementation of the peer-to-peer simulation used for the experimental evaluation of the Heterogeneous Differential Privacy paper.☆10Jul 5, 2020Updated 5 years ago
- 毕业设计。Keywords: 层次聚类、谱聚类、WordNet☆10Jun 29, 2014Updated 11 years ago
- 基于WordNet和句法依存树,实现对英语短语的搭配提取,包括连续的和非连续的英语短语词组。☆10Jul 2, 2016Updated 9 years ago
- Parallel approach on distance based outlier detection on streaming data☆10Jan 12, 2020Updated 6 years ago
- Data from my web crawling project that ranked universities using the PageRank algorithm on a network comprised of faculty relationships.☆11Nov 7, 2021Updated 4 years ago
- A C implementation of AES got from OpenSSL☆14Dec 19, 2011Updated 14 years ago
- Hadoop In Action Examples☆40Apr 26, 2021Updated 4 years ago
- Social Lab is NOT a real social network. It is a social engineering wargame.☆25Jan 6, 2014Updated 12 years ago
- Python implementation of Hierarchical Random Graphs☆20Jul 16, 2023Updated 2 years ago
- Distributed sentiment analysis on GitHub commit comments☆10Jun 9, 2015Updated 10 years ago
- ☆29Oct 27, 2023Updated 2 years ago
- A Spring and React based dispatch & delivery management application.☆12Jan 4, 2022Updated 4 years ago
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆30Oct 24, 2020Updated 5 years ago
- Use Python3, Django, Django-rest-framework to achieve alipay payment. 包括支付宝支付,支付宝服务器异步通知,支付宝退款☆12May 26, 2018Updated 7 years ago
- 抓取国家统计局数据☆13May 4, 2016Updated 9 years ago
- ☆25Apr 3, 2023Updated 2 years ago
- Match tokenized words and phrases within the original, untokenized, often messy, text.☆19Apr 11, 2023Updated 2 years ago
- 刷点击量的Python小程序☆11Jul 17, 2016Updated 9 years ago
- Automatic Text Summarization with Machine Learning☆15Jul 30, 2017Updated 8 years ago
- Improving Opinion-Target Extraction with Character-Level Word Embeddings☆11Jan 25, 2018Updated 8 years ago
- JAVA数据库组件;支持读写分离;支持分表;单表无需SQL☆10Aug 3, 2016Updated 9 years ago
- Scorer for grammatical error correction systems.☆14Feb 24, 2016Updated 10 years ago
- A deep packet inspection (DPI) framework for benchmarking the covertness of protocol-obfuscation proxies.☆14Apr 13, 2022Updated 3 years ago
- 中文自然语言处理☆11Apr 4, 2019Updated 6 years ago
- A Python module for dealing with so called "typed bytes".☆31Dec 6, 2011Updated 14 years ago
- Scripts for capturing tweets, creating data dictionary, processing & scoring tweet sentiments☆11Aug 24, 2015Updated 10 years ago
- Differentially private data release for data mining [SIGKDD 2011] - convert a relational data set into a differentially-private version w…☆16Sep 11, 2015Updated 10 years ago
- Full Stack E-Commerce App built with React, using Firebase and Stripe API. 🗽🚀☆26Nov 19, 2024Updated last year
- Sanitization / data masking library for Go (golang)☆22Jan 26, 2019Updated 7 years ago
- Analyse sentiment of Chinese text.☆12Apr 12, 2017Updated 8 years ago
- Sentiment Analysis on Movie Review using Bing Liu's Dictionary, Python, Meaningcloud☆14May 3, 2016Updated 9 years ago
- tampermonkey-js☆13Jan 17, 2017Updated 9 years ago
- ☆40Oct 14, 2022Updated 3 years ago
- A generic vantage point tree (vp-tree) implementation in Java☆45May 12, 2021Updated 4 years ago
- Code and data for extracting co-occurrence networks from Shakespeare's plays☆16Aug 9, 2025Updated 7 months ago
- Robust and scalable inference of cell lineages via consensus clustering. Features novel algorithms for the comparison of weighted graphs …☆14Jan 16, 2017Updated 9 years ago
- cluster based generalization for k-anonymity☆30May 27, 2019Updated 6 years ago