qiyuangong / MondrianView external linksLinks
Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).
☆175Nov 30, 2023Updated 2 years ago
Alternatives and similar repositories for Mondrian
Users that are interested in Mondrian are comparing it to the libraries listed below
Sorting:
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆36Apr 27, 2023Updated 2 years ago
- Anonymization methods for network security.☆164Mar 2, 2025Updated 11 months ago
- Mondrian for L-diveristy. It's not available now.☆20May 27, 2019Updated 6 years ago
- ☆19Oct 27, 2023Updated 2 years ago
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆40Feb 28, 2019Updated 6 years ago
- This project is about applying k-anonymity principle to tables of relational data. Later on, the centralized algorithms will be modified …☆12Feb 12, 2013Updated 13 years ago
- A workshop on data privacy methods for data scientists.☆72Aug 23, 2022Updated 3 years ago
- k匿名☆19May 12, 2021Updated 4 years ago
- This repository contains the artifacts accompanied by the paper "Fair Preprocessing"☆13Jul 20, 2021Updated 4 years ago
- The Python Differential Privacy Library. Built on top of: https://github.com/google/differential-privacy☆544Nov 7, 2025Updated 3 months ago
- Implementation of voronoi diagram with incremental algorithm☆13Jun 10, 2020Updated 5 years ago
- ☆274Apr 3, 2024Updated last year
- data synthesis tool to simplify privacy preservation☆15Feb 14, 2023Updated 3 years ago
- Differential privacy protection based on Diffle-Hellman Key Exchange and AES256.☆10May 10, 2015Updated 10 years ago
- 一个医疗数据匿名化工具网站。☆13Jun 28, 2022Updated 3 years ago
- Amnesia☆173Dec 25, 2025Updated last month
- Privacy Engineering Collaboration Space☆272Aug 18, 2025Updated 5 months ago
- Pytorch implementations of Co-teaching for noisy label learning☆13Jun 28, 2022Updated 3 years ago
- Location Privacy Meter: A tool to model human mobility and quantify location privacy☆16May 25, 2021Updated 4 years ago
- ☆15Sep 11, 2022Updated 3 years ago
- Evaluation code for mobile crowdsourcing privacy (paper: On (The Lack Of) Location Privacy in Crowdsourcing Applications -- USENIX Securi…☆19Nov 25, 2020Updated 5 years ago
- A set of utilities to quicky analyze time series.☆21Oct 28, 2021Updated 4 years ago
- This repository contains the codes for first large-scale investigation of Differentially Private Convex Optimization algorithms.☆62Nov 5, 2018Updated 7 years ago
- ☆24Dec 15, 2018Updated 7 years ago
- Generating Training Data Made Easy☆43Jul 3, 2020Updated 5 years ago
- Easy differential privacy in R☆69Jul 1, 2022Updated 3 years ago
- Google's differential privacy libraries.☆3,283Feb 6, 2026Updated last week
- RAPPOR: Privacy-Preserving Reporting Algorithms☆871Jul 14, 2022Updated 3 years ago
- The infamous DuckDB quack extension rewritten in C and built with Zig☆22Oct 7, 2025Updated 4 months ago
- Typescript utilities for input validation, with emphasis on security☆19Jan 3, 2024Updated 2 years ago
- ☆21Dec 9, 2020Updated 5 years ago
- Analytic calibration for differential privacy with Gaussian perturbations☆51Oct 7, 2018Updated 7 years ago
- Differentially private synthetic data☆47Dec 18, 2020Updated 5 years ago
- A toolbox for differentially private data generation☆130Jul 6, 2023Updated 2 years ago
- Watson OpenScale tutorials including sample models, notebooks and applications☆22Dec 8, 2022Updated 3 years ago
- ☆34Aug 6, 2025Updated 6 months ago
- SAP Security research sample code and tutorials for generating differentially private synthetic datasets using generative deep learning m…☆22Mar 7, 2024Updated last year
- Examples scripts that showcase how to use Private AI Text to de-identify, redact, hash, tokenize, mask and synthesize PII in text.☆85Updated this week
- ☆26Feb 27, 2022Updated 3 years ago