qiyuangong / Basic_Mondrian
The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attributes to numerical ones. This transformations is not good for some applications. In 2006, LeFevre proposed basic Mondrian, which support both categorical and numerical attributes. This repository is an impleme…
☆32Updated last year
Related projects: ⓘ
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆168Updated 9 months ago
- cluster based generalization for k-anonymity☆28Updated 5 years ago
- Mondrian for L-diveristy. It's not available now.☆18Updated 5 years ago
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆37Updated 5 years ago
- ☆18Updated this week
- Naive implementation of basic Differential-Privacy framework and algorithms☆46Updated 2 years ago
- QGIS differential privacy processing plugin☆22Updated 8 years ago
- Anonymization methods for network security.☆149Updated 4 years ago
- Code for NIPS'2017 paper☆49Updated 4 years ago
- ☆42Updated 3 years ago
- Location Privacy Meter: A tool to model human mobility and quantify location privacy☆15Updated 3 years ago
- k匿名☆18Updated 3 years ago
- 关于2019和2018年的一些东西☆29Updated 4 years ago
- K-Anonymity Simulator☆15Updated 7 years ago
- ☆16Updated 10 months ago
- Accompanying source code to my Bachelor's thesis at TUHH☆11Updated 6 years ago
- list of differential-privacy related resources☆279Updated 5 months ago
- This repository contains the codes for first large-scale investigation of Differentially Private Convex Optimization algorithms.☆63Updated 5 years ago
- Python package for simple implementations of state-of-the-art LDP frequency estimation algorithms. Contains code for our VLDB 2021 Paper.☆71Updated last year
- A Privacy Preserving Data Mining Platform☆46Updated 12 years ago
- Sample LDP implementation in Python☆113Updated last year
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆50Updated 3 years ago
- Evaluating variety of k-Anonymity techniques.☆53Updated 11 months ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆129Updated last year
- Source code of paper "Differentially Private Generative Adversarial Network"☆66Updated 5 years ago
- Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference…☆117Updated last year
- Useful tools for differential privacy☆213Updated 2 years ago
- Code for Membership Inference Attack against Machine Learning Models (in Oakland 2017)☆176Updated 6 years ago
- A Differentially-Private Random Decision Forest using Smooth Sensitivity☆12Updated 7 years ago
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆22Updated 3 years ago