Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy
☆40Feb 28, 2019Updated 7 years ago
Alternatives and similar repositories for K-anonymity-and-Differential-Privacy
Users that are interested in K-anonymity-and-Differential-Privacy are comparing it to the libraries listed below
Sorting:
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆36Apr 27, 2023Updated 2 years ago
- ☆19Oct 27, 2023Updated 2 years ago
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆175Nov 30, 2023Updated 2 years ago
- Accompanying source code to my Bachelor's thesis at TUHH☆11Mar 15, 2018Updated 7 years ago
- ☆11May 7, 2020Updated 5 years ago
- Evaluating variety of k-Anonymity techniques.☆55Sep 21, 2023Updated 2 years ago
- 本项目实现自《差分隐私下满足一致性的轨迹流量发布方法》,作者蔡剑平☆12Sep 2, 2019Updated 6 years ago
- Python implementation of differential privacy using Laplace mechanism☆11Aug 9, 2022Updated 3 years ago
- Anonymization methods for network security.☆164Mar 2, 2025Updated last year
- Naive implementation of basic Differential-Privacy framework and algorithms☆49Aug 30, 2022Updated 3 years ago
- Mondrian for L-diveristy. It's not available now.☆20May 27, 2019Updated 6 years ago
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆29Jan 31, 2021Updated 5 years ago
- cluster based generalization for k-anonymity☆30May 27, 2019Updated 6 years ago
- Location Privacy Protection System Based on K-Anonymous☆25Mar 26, 2017Updated 8 years ago
- Applying Laplace and exponential mechanisms to add random noise to data for differential privacy. Plotting MSE vs. epsilon.☆31Dec 20, 2025Updated 2 months ago
- Useful tools for differential privacy☆219Sep 11, 2022Updated 3 years ago
- Source code for the Observatory of Anonymity☆10Dec 5, 2022Updated 3 years ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- A compiled list of resources and materials for PPML☆11May 10, 2025Updated 10 months ago
- ☆15Jul 14, 2025Updated 7 months ago
- ☆11May 15, 2025Updated 9 months ago
- ☆14Apr 6, 2025Updated 11 months ago
- This repository aims to be an ever-expanding workshop series that covers all things enclaves 📚☆12Aug 15, 2022Updated 3 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Open source differential privacy for energy efficiency analytics☆17Apr 6, 2021Updated 4 years ago
- Vertical Federated Learning Implementation for Logistic regression☆13Mar 12, 2022Updated 3 years ago
- Readings in Differential Privacy☆18Jan 2, 2024Updated 2 years ago
- ☆21Feb 12, 2025Updated last year
- [CVPR 2023] The official Pytorch implementation of Re-GAN☆18Jul 11, 2023Updated 2 years ago
- MiniMax LLM + Pi05 VLA Robot Agent Demo☆33Dec 31, 2025Updated 2 months ago
- ☆17Jul 6, 2023Updated 2 years ago
- 国外新闻网站爬虫,并存储至Excel中☆13Jun 13, 2022Updated 3 years ago
- Code for Canonne-Kamath-Steinke paper https://arxiv.org/abs/2004.00010☆63Jun 16, 2020Updated 5 years ago
- Spoofing Speaker Verification Systems with Multi-speaker Text-to-speech Synthesis