This section provides examples of how to use the PPSF open-source privacy preserving library to perform various data mining tasks.
If you have any question or if you want to report a bug, you can check the FAQ or contact me. You can also have a look at the various articles that I have referenced on the algorithms page of this website to learn more about each algorithm.
List of examples
K-anonymity algorithms:
- example of PTA algorithm
- example of GSC algorithm
Privacy-preserving data mining algorithms:
- example of Greedy algorithm
- example of PSO2DT algorithm
- example of sGA2DT algorithm
- example of pGA2DT algorithm
- example of cpGA2DT algorithm
- example of SIF-IDF algorithm
Privacy-preserving utility mining algorithms:
- example of HHUIF algorithm
- example of MSICF algorithm
- example of MSU-MAU algorithm
- example of MSU-MIU algorithm
- example of pGAPPUM algorithm