SummonY / DifferentialPrivacy
Differential privacy protection based on Diffle-Hellman Key Exchange and AES256.
☆9Updated 9 years ago
Alternatives and similar repositories for DifferentialPrivacy:
Users that are interested in DifferentialPrivacy are comparing it to the libraries listed below
- Implementation of the peer-to-peer simulation used for the experimental evaluation of the Heterogeneous Differential Privacy paper.☆10Updated 4 years ago
- code for kaggle competition Microsoft malware classification☆41Updated 9 years ago
- cluster based generalization for k-anonymity☆29Updated 5 years ago
- 第二届阿里云安全算法挑战赛☆16Updated 6 years ago
- ☆19Updated 5 years ago
- My AI security testing projects☆41Updated 6 years ago
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆34Updated last year
- ☆11Updated 8 years ago
- Kaggle微软恶意代码分类☆153Updated 4 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆112Updated 6 years ago
- 基于豆瓣电影数☆28Updated 5 years ago
- My codes☆24Updated 7 years ago
- 第三届阿里云安全算法挑战赛☆37Updated last year
- A big data platform for analyzing web access logs☆51Updated 2 years ago
- a demo for detecting anomaly url☆39Updated 7 years ago
- Implementation of text clustering algorithms including K-means, MBSAS, DBSCAN.☆44Updated 7 years ago
- Spark 编程指南简体中文版☆33Updated 8 years ago
- K-Anonymity Simulator☆15Updated 7 years ago
- java开发的基于kafka、xlog的web日志实时分析storm topology。☆56Updated 10 years ago
- https://www.cdxy.me/?p=806☆31Updated 5 years ago
- Classification LSTM RNN for DeepLog realization☆8Updated 6 years ago
- Applying text model to Detection Task☆72Updated 7 years ago
- 新闻评论观点挖掘系统,粗粒度的分析出新闻网评观点的倾向和走势☆53Updated 9 years ago
- 常见数据挖掘和机器学习算法☆33Updated 11 years ago
- 基于Strom的日志实时流量分析主动防御(CCFirewall)系统☆71Updated 7 years ago
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆170Updated last year
- FLEX (Federated Learning EXchange,FLEX) protocol is a set of standardized federal learning agreements designed by Tongdun AI Research Gro…☆54Updated last year
- 恶意代码家族聚类。DataCon☆11Updated 5 years ago
- 思维导图书录☆14Updated 9 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 7 months ago