This is a recommended paper list for the course of Privacy Computing.
☆10Mar 26, 2024Updated last year
Alternatives and similar repositories for PrivacyComputing-PaperList
Users that are interested in PrivacyComputing-PaperList are comparing it to the libraries listed below
Sorting:
- Self-Teaching Notes on Gradient Leakage Attacks against GPT-2 models.☆14Mar 18, 2024Updated 2 years ago
- For making notes when researching and studying.☆10Jul 29, 2022Updated 3 years ago
- Hub for Azure Cosmos DB content on GitHub☆16Mar 28, 2023Updated 2 years ago
- "SQL Assistant" was built as a demonstration of OpenAI's tools and APIs with the goal of showcasing the potential of natural language pro…☆12Mar 12, 2023Updated 3 years ago
- WEB programming, lecture notes and assignments from CS142: Web Applications (Spring 2022) course.☆13Mar 2, 2023Updated 3 years ago
- Apache Spark Application Development -- George Jen, Jen Tek LLC☆16Apr 21, 2023Updated 2 years ago
- ☆14Oct 21, 2021Updated 4 years ago
- Differentially Private Synthetic Data Generation [DP-SDG] - Experimental Setups & Knowledge Base - WORK IN PROGRESS☆12Jul 26, 2022Updated 3 years ago
- Code Release for ICML 2024: MS-TIP - Imputation Aware Pedestrian Trajectory Prediction☆20Apr 17, 2025Updated 11 months ago
- Sample applications for the Confidential Consortium Framework (CCF)☆20Feb 12, 2026Updated last month
- ☆10Jun 18, 2020Updated 5 years ago
- Gradient-Leakage Resilient Federated Learning☆14Jul 25, 2022Updated 3 years ago
- ☆46Aug 4, 2023Updated 2 years ago
- ☆10Apr 14, 2025Updated 11 months ago
- TKDE'23: A Survey and Experimental Study on Privacy-Preserving Trajectory Data Publishing☆12May 5, 2023Updated 2 years ago
- Deep learning for pedestrian path prediction☆16Apr 25, 2024Updated last year
- Standard Architecture for Trusted Research Environments specification☆29Mar 13, 2026Updated last week
- CPSC 330: Applied Machine Learning☆15Jul 6, 2023Updated 2 years ago
- OLIVE: Oblivious and Differentially Private Federated Learning on TEE☆17May 10, 2023Updated 2 years ago
- The Little Introduction To Programming☆44Aug 20, 2020Updated 5 years ago
- code for G2LTraj☆19Dec 23, 2024Updated last year
- FTA as a Service☆25Apr 3, 2025Updated 11 months ago
- Find and solve sudoku puzzles in images using deep learning and computer vision☆23Mar 9, 2020Updated 6 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- 2022年春哈工大软件架构与中间件课程资料☆18Dec 18, 2022Updated 3 years ago
- Reconstruction Attack on Differential Private Trajectory Protection Mechanisms☆16Oct 3, 2024Updated last year
- An Emulator and SDK for Intel SGX extension☆32Mar 6, 2017Updated 9 years ago
- ☆26Oct 5, 2021Updated 4 years ago
- BUAA Course Grab is intended to be a tool set for BUAA undergraduates to automatically grab or drop courses.☆25Apr 14, 2022Updated 3 years ago
- 北航场馆预约系统Python+Selenium自动化脚本☆29Apr 27, 2022Updated 3 years ago
- ☆24Apr 7, 2021Updated 4 years ago
- ☆29Dec 22, 2022Updated 3 years ago
- [Neurips'24] PyTorch Implementation of "MGF: Mixed Gaussian Flow for Diverse Trajectory Prediction".☆26Apr 5, 2025Updated 11 months ago
- A Python Package for NLP obfuscation using Differential Privacy☆29Jul 28, 2025Updated 7 months ago
- 北航博雅课程Python爬虫接口☆31Nov 6, 2025Updated 4 months ago
- some great skin for potplayer☆11Mar 2, 2018Updated 8 years ago
- [ECCV 2022 Oral] Official Implementation of "Social-SSL: Self-Supervised Cross-Sequence Representation Learning Based on Transformers for…☆23Jan 4, 2023Updated 3 years ago
- Collection of tools and resources for managing the statistical disclosure control of trained machine learning models☆34Updated this week
- Conditional Adversarial Trajectory Synthesis☆26Oct 12, 2023Updated 2 years ago