Documentation

This section provides examples of how to use the PPSF open-source privacy preserving library  to perform various data mining tasks.

If you have any question or if you want to report a bug, you can check the FAQ or contact me. You can also have a look at the various articles that I have referenced on the algorithms page of this website to learn more about each algorithm.

List of examples

    K-anonymity algorithms:

  • example of PTA algorithm
  • example of GSC algorithm

Privacy-preserving data mining algorithms:

  • example of Greedy algorithm
  • example of PSO2DT algorithm
  • example of sGA2DT algorithm
  • example of pGA2DT algorithm
  • example of cpGA2DT algorithm
  • example of SIF-IDF algorithm

Privacy-preserving utility mining algorithms: