Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy
☆40Feb 28, 2019Updated 7 years ago
Alternatives and similar repositories for K-anonymity-and-Differential-Privacy
Users that are interested in K-anonymity-and-Differential-Privacy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆37Apr 27, 2023Updated 2 years ago
- k匿名☆19May 12, 2021Updated 4 years ago
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆176Nov 30, 2023Updated 2 years ago
- Python implementation of differential privacy using Laplace mechanism☆11Aug 9, 2022Updated 3 years ago
- 本项目实现自《差分隐私下满足一致性的轨迹流量发布方法》,作者蔡剑平☆12Sep 2, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Naive implementation of basic Differential-Privacy framework and algorithms☆49Aug 30, 2022Updated 3 years ago
- Anonymization methods for network security.☆165Mar 2, 2025Updated last year
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆29Jan 31, 2021Updated 5 years ago
- Useful tools for differential privacy☆219Sep 11, 2022Updated 3 years ago
- cluster based generalization for k-anonymity☆30May 27, 2019Updated 6 years ago
- ☆17Aug 6, 2023Updated 2 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆12Apr 1, 2023Updated 3 years ago
- SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks☆12Jun 2, 2022Updated 3 years ago
- LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection☆86Sep 2, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- ☆10May 23, 2023Updated 2 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Dec 10, 2020Updated 5 years ago
- FedAvg code with privacy protection function, the application of Paillier homomorphic encryption algorithm and differential privacy, diff…☆133Sep 30, 2024Updated last year
- ☆15Mar 9, 2026Updated last month
- Differential Privacy Testing System☆22Apr 24, 2020Updated 5 years ago
- Demo of XOR erasure coding.☆10Mar 5, 2017Updated 9 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Readings in Differential Privacy☆18Jan 2, 2024Updated 2 years ago
- This is the source code of IJCNN 2023 paper TieFake: Title-Text Similarity and Emotion-Aware Fake News Detection (TieFake).☆16Dec 21, 2023Updated 2 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆16May 5, 2022Updated 3 years ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago
- Extract stay points from a GPS log file☆21Sep 18, 2020Updated 5 years ago
- ☆19Jun 11, 2021Updated 4 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. I…☆11Nov 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Training (hopefully) safe agents in gridworlds☆25May 12, 2019Updated 6 years ago
- Algorithms used in cryptography, an academic introduction☆20Nov 14, 2020Updated 5 years ago
- This repository aims to be an ever-expanding workshop series that covers all things enclaves 📚☆12Aug 15, 2022Updated 3 years ago
- ☆12Nov 30, 2021Updated 4 years ago
- 这是一个基于Paillier同态加密系统的隐私保护SVM模型训练算法。☆17Oct 19, 2022Updated 3 years ago
- ☆11Sep 15, 2023Updated 2 years ago
- An implementation of "Data Synthesis via Differentially Private Markov Random Fields"☆15Apr 2, 2024Updated 2 years ago