llgeek / K-anonymity-and-Differential-PrivacyView external linksLinks
Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy
☆40Feb 28, 2019Updated 6 years ago
Alternatives and similar repositories for K-anonymity-and-Differential-Privacy
Users that are interested in K-anonymity-and-Differential-Privacy are comparing it to the libraries listed below
Sorting:
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆36Apr 27, 2023Updated 2 years ago
- k匿名☆19May 12, 2021Updated 4 years ago
- Accompanying source code to my Bachelor's thesis at TUHH☆11Mar 15, 2018Updated 7 years ago
- Evaluating variety of k-Anonymity techniques.☆55Sep 21, 2023Updated 2 years ago
- This project is about applying k-anonymity principle to tables of relational data. Later on, the centralized algorithms will be modified …☆12Feb 12, 2013Updated 13 years ago
- 本项目实现自《差分隐私下满足一致性的轨迹流量发布方法》,作者蔡剑平☆12Sep 2, 2019Updated 6 years ago
- Anonymization methods for network security.☆164Mar 2, 2025Updated 11 months ago
- 数据隐私k匿名,samarati算法和mondrian算法的Python3实现。☆18Apr 26, 2022Updated 3 years ago
- cluster based generalization for k-anonymity☆30May 27, 2019Updated 6 years ago
- Location Privacy Protection System Based on K-Anonymous☆25Mar 26, 2017Updated 8 years ago
- 本科毕设时的代码,用于k匿名栅格化位置隐私保护“群智背景下”☆10Oct 11, 2018Updated 7 years ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago
- ☆10May 23, 2023Updated 2 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- A compiled list of resources and materials for PPML☆11May 10, 2025Updated 9 months ago
- ☆11May 15, 2025Updated 9 months ago
- ☆10Sep 30, 2017Updated 8 years ago
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago
- ☆11Sep 15, 2023Updated 2 years ago
- Translate Braille Writing to Plain Text☆10Nov 6, 2025Updated 3 months ago
- FedAvg code with privacy protection function, the application of Paillier homomorphic encryption algorithm and differential privacy, diff…☆132Sep 30, 2024Updated last year
- This repository aims to be an ever-expanding workshop series that covers all things enclaves 📚☆12Aug 15, 2022Updated 3 years ago
- ☆12Nov 30, 2021Updated 4 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Open source differential privacy for energy efficiency analytics☆17Apr 6, 2021Updated 4 years ago
- AndroidFaceDetection☆14Aug 5, 2017Updated 8 years ago
- ☆21Feb 12, 2025Updated last year
- [CVPR 2023] The official Pytorch implementation of Re-GAN☆18Jul 11, 2023Updated 2 years ago
- ☆17Jul 6, 2023Updated 2 years ago
- This is the source code of IJCNN 2023 paper TieFake: Title-Text Similarity and Emotion-Aware Fake News Detection (TieFake).☆16Dec 21, 2023Updated 2 years ago
- Code for Canonne-Kamath-Steinke paper https://arxiv.org/abs/2004.00010☆63Jun 16, 2020Updated 5 years ago
- MusicXML to Braille Music transcription☆18Aug 19, 2020Updated 5 years ago
- Spoofing Speaker Verification Systems with Multi-speaker Text-to-speech Synthesis☆11Jun 21, 2022Updated 3 years ago
- Dual Path Networks on cifar-10 and fashion-mnist datasets☆18Aug 31, 2017Updated 8 years ago
- used to evaluate wavenet vocoder by rmse f0, MCD, rmse ap...☆15Jan 20, 2020Updated 6 years ago
- 语音合成端到端TTS模型vits中文版,VITS Mandarin☆15Sep 17, 2022Updated 3 years ago
- 《数字图像处理》课程设计,基于深度学习的人脸识别项目。采用三层卷积池化+全连接神经网络☆19Jul 5, 2020Updated 5 years ago