☆19Oct 27, 2023Updated 2 years ago
Alternatives and similar repositories for k-AnonML
Users that are interested in k-AnonML are comparing it to the libraries listed below
Sorting:
- Evaluating variety of k-Anonymity techniques.☆55Sep 21, 2023Updated 2 years ago
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆40Feb 28, 2019Updated 7 years ago
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆175Nov 30, 2023Updated 2 years ago
- cluster based generalization for k-anonymity☆30May 27, 2019Updated 6 years ago
- Anonymization methods for network security.☆164Mar 2, 2025Updated last year
- 本科毕设时的代码,用于k匿名栅格化位置隐私保护“群智背景下”☆10Oct 11, 2018Updated 7 years ago
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆36Apr 27, 2023Updated 2 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- Lithops application examples☆11Dec 19, 2024Updated last year
- ☆13Aug 29, 2024Updated last year
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago
- ☆18Mar 15, 2025Updated 11 months ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- ARX is a comprehensive open source data anonymization tool aiming to provide scalability and usability. It supports various anonymization…☆700Oct 1, 2025Updated 5 months ago
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆58Sep 14, 2025Updated 5 months ago
- Private Decision Tree Evaluation protocols☆11Jun 9, 2020Updated 5 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- ☆17May 28, 2024Updated last year
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆19Aug 7, 2022Updated 3 years ago
- Oblivious Transfer extension in java☆18Nov 30, 2016Updated 9 years ago
- Intro to Rust talk☆15Dec 7, 2022Updated 3 years ago
- WAFFLE: Watermarking in Federated Learning☆23Aug 21, 2023Updated 2 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Dec 24, 2025Updated 2 months ago
- ARXaaS is a "Anonymization as a Service" project built ontop of the ARX library☆25Dec 5, 2023Updated 2 years ago
- Final Project for Udacity Machine Learning Course☆21Feb 5, 2016Updated 10 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆27Nov 13, 2018Updated 7 years ago
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效 用性☆29Jan 31, 2021Updated 5 years ago
- A core and experimental implementation of ClaimChain☆34Oct 13, 2018Updated 7 years ago
- Talk With TLS: [D]TLS usage Samples, Test and much more☆25Sep 4, 2022Updated 3 years ago
- Location Privacy Protection System Based on K-Anonymous