Package | Description |
---|---|
org.deidentifier.arx.examples |
Modifier and Type | Class and Description |
---|---|
class |
Example1
This class implements an example on how to use the API by directly providing
the input datasets.
|
class |
Example10
This class implements an example on how to apply the d-presence privacy model
and create a research subset by providing a data subset.
|
class |
Example11
This class implements an example on how to apply the d-presence privacy model
and create a research subset by providing a data selector.
|
class |
Example12
This class implements an example on how to apply the d-presence privacy model
and create a research subset by providing a complex data selector.
|
class |
Example13
This class implements an simple example for using multiple sensitive attributes and
different privacy models.
|
class |
Example14
This class implements an example on how to use the Loss Metric.
|
class |
Example16
This class implements an example of how to use the API for access to basic statistics
about the data.
|
class |
Example17
This class implements an example of how to list the available data types.
|
class |
Example18
This class implements examples of how to use the builders for generalization hierarchies.
|
class |
Example19
This class implements an example of how to use the API for creating different
output representations of an input dataset.
|
class |
Example2
This class implements an example on how to use the API by providing CSV files
as input.
|
class |
Example20
This class implements examples of how to use aggregate functions.
|
class |
Example21
This class demonstrates the use of the data import facilities provided by the
ARX framework.
|
class |
Example22
This class implements an example on how to use the l-diversity privacy model
without protecting sensitive assocations.
|
class |
Example23
This class implements an example on how to use multiple instances of l-diversity
without protecting sensitive associations.
|
class |
Example24
This class implements examples on how to directly use empty and functional
hierarchies.
|
class |
Example25
This class implements an example for using the generalized loss metric with different types of
generalization hierarchies.
|
class |
Example26
This class implements examples of how to use an interval-based hierarchy builder
with high precision .
|
class |
Example27
This class implements an example on how to use data cleansing capabilities
|
class |
Example28
This class implements an example on how to use data cleansing using the DataSource functionality.
|
class |
Example29
This class implements an example of how to perform risk analyses with the API
|
class |
Example3
This class implements an example on how to use the API by directly providing
the input datasets.
|
class |
Example30
This class implements an example of how to compute summary statistics
|
class |
Example31
This class implements an example of how to use microaggregation
|
class |
Example32
This class implements an example of how to use microaggregation with generalization
|
class |
Example33
This class implements an example of how to use microaggregation.
|
class |
Example34
This class implements an example of how to use the heuristic search algorithm
|
class |
Example36
This class implements an example of how to use utility-based microaggregation
|
class |
Example37
This class implements an example of how to use (e,d)-DP
|
class |
Example38
This class implements an example of how to use local recoding with ARX
|
class |
Example39
This class implements an example on how to compare data mining performance
|
class |
Example4
This class implements an example on how to use the API for tools such as GUIs.
|
class |
Example40
This class implements an example on how to compare data mining performance
|
class |
Example41
This class implements an example on how to use the k-map model
|
class |
Example42
This class implements an example on how to use the k-map and d-presence models combined
|
class |
Example43
This class implements an example of how to evaluate combined risk metrics
|
class |
Example44
This class implements an example of how to use the k-map privacy model with a statistical estimator.
|
class |
Example45
This class implements an example of how to use the mixed risk model.
|
class |
Example46
This class implements an example of how to use the distribution of risks
|
class |
Example47
Example for evaluating distinction and separation of attributes as described in
R.
|
class |
Example48
This class implements an example of how to use ordered distance t-closeness.
|
class |
Example49
Examples of using the no-attack variant of the game-theoretic approach for
performing a monetary cost/benefit analysis using prosecutor risk.
|
class |
Example5
This class implements an example on how to use the API by directly providing
the input datasets.
|
class |
Example50
Examples of using the no-attack variant of the game-theoretic approach for
performing a monetary cost/benefit analysis using journalist risk.
|
class |
Example51
Examples of using the game-theoretic approach for
performing a monetary cost/benefit analysis using prosecutor risk.
|
class |
Example52
Examples of using the game-theoretic approach for
performing a monetary cost/benefit analysis using journalist risk.
|
class |
Example53
This class implements an example on how to generate reports
|
class |
Example54
This class implements an example on how to access quality statistics
|
class |
Example55
This class implements an example of how to use a fast algorithm for local recoding with ARX
|
class |
Example56
This class implements an example of how to evaluate risk with wildcard matching
|
class |
Example57
This class implements an example on how to analyze risks with wildcards for data transformed with cell suppression
|
class |
Example58
This class implements an example that shows consistent handling of suppressed records in input and output
|
class |
Example59
This class implements an example that shows handling of suppressed values and records in input data
|
class |
Example6
This class implements an example on how to use the API for tools such as GUIs.
|
class |
Example60
This class implements an example of processing highdimensional data
|
class |
Example7
This class implements an example on how to use the API for tools such as GUIs.
|
class |
Example8
This class implements an example on how to apply the t-closeness criterion.
|
class |
Example9
This class implements an example on how to apply the d-presence criterion.
|