A Framework for Machine Learning on Encrypted Data
☆12Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for tf-encrypted
Users that are interested in tf-encrypted are comparing it to the libraries listed below
Sorting:
- TensorFlow World 2019 Tutorial: Privacy-Preserving Machine Learning with TF Encrypted & PySyft☆45May 16, 2023Updated 2 years ago
- Use CSV files to generate batch messages, use AWS Greengrass, and support one-click deployment.☆14Jan 2, 2022Updated 4 years ago
- Ini kumpulan beberapa materi lab pada Digitalent Schoolarship Python Essentials 2019☆10Mar 27, 2022Updated 3 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆35Jun 10, 2021Updated 4 years ago
- Use Lambda to convert the format to CSV format when Kinesis Firehose is stored to the S3☆13Jan 4, 2022Updated 4 years ago
- Learning to Combine Local and Global Image Information for Contactless Palmprint Recognition☆11Dec 7, 2021Updated 4 years ago
- This project aims to extract ROI like finger tip, Palmprint and Hand-geometry from a single hand image.☆10Aug 24, 2023Updated 2 years ago
- ISC Student Cluster Competition 2019 -- AI challenge☆10Jun 16, 2019Updated 6 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- This is a submission example for CelebA-Spoof Challenge participants.☆10Sep 8, 2020Updated 5 years ago
- Simulation, multi-path estimation, and CBR parsing code of SIGCOMM2023 BeamSense CBR-Sensing☆10Jan 14, 2024Updated 2 years ago
- This repository contains the official implementation (PyTorch) of "Multimodal Forgery Detection Using Ensemble Learning" proposed in APSI…☆10Jan 4, 2023Updated 3 years ago
- Part II of the tutorial for making a PoC in foundry for Immunefi☆11Aug 29, 2022Updated 3 years ago
- Asterinas Confidential Computing is a collection of open-source projects featuring full-stack capabilities in confidential computing.☆16Oct 15, 2024Updated last year
- Post-CTF writeups☆12Oct 28, 2016Updated 9 years ago
- ☆11Nov 30, 2015Updated 10 years ago
- Privacy-preserving k-means clustering on data owned by multiple parties☆14May 10, 2016Updated 9 years ago
- A benchmarking tool for Solana RPC nodes using Raydium swaps. While simple SOL transfers only use about 200-5000 compute units (CU), this…☆15Jul 18, 2025Updated 7 months ago
- ☆13May 21, 2024Updated last year
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- C++ realisation of gnfs algorithm☆13Aug 5, 2020Updated 5 years ago
- ☆10Jun 29, 2022Updated 3 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- Generate text images for training deep learning ocr model☆10Oct 22, 2018Updated 7 years ago
- Dual-Branch Meta-learning Network with Distribution Alignment for Face Anti-spoofing, Transactions on Information Forensics & Security☆11Jan 5, 2022Updated 4 years ago
- ☆15Apr 1, 2020Updated 5 years ago
- ☆10Jun 12, 2018Updated 7 years ago
- Simple example to show how to capture ZigBee/IEEE 802.15.4 and send it to WIreShark wpan using RFtap under GnuRadio☆15Nov 12, 2019Updated 6 years ago
- FedBERT : A federated approach that enables clients with limited computing resource to participate without violating data privacy.☆14Jul 3, 2023Updated 2 years ago
- glsl testbench -- a WIP opengl wrapper/shader testing system☆12Feb 26, 2021Updated 5 years ago
- ☆12Apr 10, 2023Updated 2 years ago
- RuCTF 2019. Developed with ♥ by Hackerdom team☆13Nov 28, 2021Updated 4 years ago
- An implementation of model parallel autoregressive transformers on GPUs, based on the DeepSpeed library.☆13Jun 7, 2023Updated 2 years ago
- ☆12Sep 23, 2021Updated 4 years ago
- MIT 6.875☆14Dec 13, 2025Updated 2 months ago
- Introduction to Support Vector Machines☆16Jan 2, 2014Updated 12 years ago
- Solution to the Kaggle Facebook Recruiting IV contest☆11Feb 21, 2016Updated 10 years ago
- Some algorithms☆62Jun 2, 2014Updated 11 years ago