qiyuangong / Top_Down_Greedy_Anonymization
Top_Down_Greedy_Anonymization is a Top-down greedy algorithm data anonymization algorithm for relational dataset, proposed by Jian Xu in his papers.
☆10Updated 9 years ago
Alternatives and similar repositories for Top_Down_Greedy_Anonymization:
Users that are interested in Top_Down_Greedy_Anonymization are comparing it to the libraries listed below
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆173Updated last year
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆35Updated last year
- cluster based generalization for k-anonymity☆29Updated 5 years ago
- Mondrian for L-diveristy. It's not available now.☆19Updated 5 years ago
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆39Updated 6 years ago
- 关于2019和2018年的一些东西☆28Updated 5 years ago
- QGIS differential privacy processing plugin☆22Updated 9 years ago
- ☆20Updated last year
- Accompanying source code to my Bachelor's thesis at TUHH☆11Updated 7 years ago
- ARX is a comprehensive open source data anonymization tool aiming to provide scalability and usability. It supports various anonymization…☆655Updated 3 months ago
- GFIM: An novel algorithm of frequent item mining with local differential privacy☆12Updated 5 years ago
- K-Anonymity Simulator☆15Updated 7 years ago
- Sample LDP implementation in Python☆125Updated last year
- ConTPL: Controlling Temporal Privacy Leakage in Streaming Data Release with Differential Privacy☆10Updated 6 years ago
- Naive implementation of basic Differential-Privacy framework and algorithms☆48Updated 2 years ago
- Code for NIPS'2017 paper☆50Updated 4 years ago
- Location Privacy Protection System Based on K-Anonymous☆24Updated 8 years ago
- Python package for simple implementations of state-of-the-art LDP frequency estimation algorithms. Contains code for our VLDB 2021 Paper.☆74Updated last year
- This project is about applying k-anonymity principle to tables of relational data. Later on, the centralized algorithms will be modified …☆12Updated 12 years ago
- Compare Randomized Response and Laplace Mechanism☆9Updated 6 years ago
- Secure and utility-aware data collection with condensed local differential privacy☆17Updated 5 years ago
- Applying Laplace and exponential mechanisms to add random noise to data for differential privacy. Plotting MSE vs. epsilon.☆29Updated 4 years ago
- A notebook of awesome privacy protection,federated learning, fairness and blockchain research materials.☆32Updated 2 years ago
- Useful tools for differential privacy☆216Updated 2 years ago
- k匿名☆19Updated 3 years ago
- Anonymization methods for network security.☆157Updated last month
- 数据隐私k匿名,samarati算法和mondrian算法的Python3实现。☆18Updated 3 years ago
- 建立基于差分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆28Updated 4 years ago
- Quantifying Differential Privacy under Temporal Correlations☆12Updated last year
- Differential privacy protection based on Diffle-Hellman Key Exchange and AES256.☆9Updated 9 years ago