This section provides ** examples** of how to use the PPSF open-source privacy preserving library to perform various data mining tasks.

If you have any question or if you want to **report a bug**, you can check the FAQ or contact me. You can also have a look at the various articles that I have referenced on the algorithms page of this website to learn more about each algorithm.

**List of examples**

** K-anonymity algorithms:**

- example of PTA algorithm
- example of GSC algorithm

**Privacy-preserving data mining algorithms:**

- example of Greedy algorithm
- example of PSO2DT algorithm
- example of sGA2DT algorithm
- example of pGA2DT algorithm
- example of cpGA2DT algorithm
- example of SIF-IDF algorithm

**Privacy-preserving utility mining algorithms:**

- example of HHUIF algorithm
- example of MSICF algorithm
- example of MSU-MAU algorithm
- example of MSU-MIU algorithm
- example of pGAPPUM algorithm