2.1.5. aijack.defense.kanonymity package#
2.1.5.1. Submodules#
2.1.5.2. aijack.defense.kanonymity.wrapper module#
- class aijack.defense.kanonymity.wrapper.Mondrian(k=3)[source]#
Bases:
object
Implementation of K. LeFevre, D. J. DeWitt and R. Ramakrishnan, ‘Mondrian Multidimensional K-Anonymity,’ 22nd International Conference on Data Engineering (ICDE’06), Atlanta, GA, USA, 2006, pp. 25-25, doi: 10.1109/ICDE.2006.101. Our implementation is based on Nuclearstar/K-Anonymity (Nuclearstar/K-Anonymity)
2.1.5.3. Module contents#
- class aijack.defense.kanonymity.Mondrian(k=3)[source]#
Bases:
object
Implementation of K. LeFevre, D. J. DeWitt and R. Ramakrishnan, ‘Mondrian Multidimensional K-Anonymity,’ 22nd International Conference on Data Engineering (ICDE’06), Atlanta, GA, USA, 2006, pp. 25-25, doi: 10.1109/ICDE.2006.101. Our implementation is based on Nuclearstar/K-Anonymity (Nuclearstar/K-Anonymity)