zhhiyuan / K-AnonymityLinks
k匿名
☆19Updated 4 years ago
Alternatives and similar repositories for K-Anonymity
Users that are interested in K-Anonymity are comparing it to the libraries listed below
Sorting:
- Useful tools for differential privacy☆216Updated 2 years ago
- Sample LDP implementation in Python☆127Updated last year
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆40Updated 6 years ago
- 基于全同态加密的安全人脸识别系统/Secure Face Recognition System based on Fully Homomorphic Encryption☆142Updated 2 years ago
- 建立基于差 分隐私的贝叶斯网络,使得结构化数据同时兼备隐私性与效用性☆28Updated 4 years ago
- MIT开发的支持整数向量的同态加密 支持向量的加法,乘法和内积☆15Updated 4 years ago
- Mondrian for L-diveristy. It's not available now.☆19Updated 6 years ago
- The Algorithmic Foundations of Differential Pivacy by Cynthia Dwork Chinese Translation☆163Updated 2 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆112Updated last year
- 关于2019和2018年的一些东西☆28Updated 5 years ago
- 使用tensorflow2.1实现联合学习推荐模型,并加入差分隐私噪声进行隐私保护。☆54Updated 2 years ago
- cluster based generalization for k-anonymity☆30Updated 6 years ago
- Vertical Federated Learning Implementation for Logistic regression☆12Updated 3 years ago
- ☆20Updated last year
- ConTPL: Controlling Temporal Privacy Leakage in Streaming Data Release with Differential Privacy☆10Updated 6 years ago
- Python package for simple implementations of state-of-the-art LDP frequency estimation algorithms. Contains code for our VLDB 2021 Paper.☆74Updated last year
- Differential private machine learning☆193Updated 3 years ago
- Preserve data privacy with k-anonymity (samarati & mondrian), differential privacy, federated learning, paillier homomorphic encryption, …☆61Updated 3 years ago
- Anonymization methods for network security.☆158Updated 3 months ago
- Private set intersection implemented in Python☆101Updated 2 years ago
- 数据隐私k匿名,samarati算法和mondrian算法的Python3实现。☆18Updated 3 years ago
- GFIM: An novel algorithm of frequent item mining with local differential privacy☆12Updated 5 years ago
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆35Updated 2 years ago
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- Repository for the EDBT'23 paper "Frequency Estimation of Evolving Data Under Local Differential Privacy".☆12Updated last year
- 基于同态加密的联邦学习安全聚合系统☆45Updated 4 years ago
- Code for NIPS'2017 paper☆50Updated 4 years ago
- Implementation of "PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information"☆13Updated 2 years ago
- Paper notes and code for differentially private machine learning☆356Updated 6 months ago