This is a recommended paper list for the course of Privacy Computing.
☆10Mar 26, 2024Updated last year
Alternatives and similar repositories for PrivacyComputing-PaperList
Users that are interested in PrivacyComputing-PaperList are comparing it to the libraries listed below
Sorting:
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Electricity Theft Detection☆12May 8, 2019Updated 6 years ago
- WEB programming, lecture notes and assignments from CS142: Web Applications (Spring 2022) course.☆13Mar 2, 2023Updated 2 years ago
- Deep learning for pedestrian path prediction☆14Apr 25, 2024Updated last year
- TKDE'23: A Survey and Experimental Study on Privacy-Preserving Trajectory Data Publishing☆12May 5, 2023Updated 2 years ago
- ☆46Aug 4, 2023Updated 2 years ago
- Implementation of "Federated Full-Parameter Tuning of Billion-Sized Language Models with Communication Cost under 18 Kilobytes" (https://…☆13May 6, 2024Updated last year
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Code for Neural Networks journal paper - StoCFL: A stochastically clustered federated learning framework for Non-IID data with dynamic cl…☆12Apr 28, 2024Updated last year
- Self-Teaching Notes on Gradient Leakage Attacks against GPT-2 models.☆14Mar 18, 2024Updated last year
- Code Release for ICML 2024: MS-TIP - Imputation Aware Pedestrian Trajectory Prediction☆19Apr 17, 2025Updated 10 months ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- SQL注入测试靶场☆10Mar 22, 2017Updated 8 years ago
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago
- MATLAB toolbox for performing modal analysis using experimental data☆11Jun 23, 2022Updated 3 years ago
- [ICML 2024] DPZero: Private Fine-Tuning of Language Models without Backpropagation☆16Sep 4, 2024Updated last year
- some great skin for potplayer☆11Mar 2, 2018Updated 7 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- ☆10Jun 18, 2020Updated 5 years ago
- FEM micromagnetic simulator☆11Updated this week
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- "SQL Assistant" was built as a demonstration of OpenAI's tools and APIs with the goal of showcasing the potential of natural language pro…☆12Mar 12, 2023Updated 2 years ago
- ☆13Aug 31, 2024Updated last year
- Simple MATLAB toolbox for deep learning network: Version 1.0.3☆16Apr 16, 2019Updated 6 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- A Python implementation of the non_iid tests in SP800-90B.☆13Aug 2, 2021Updated 4 years ago
- The Ranflood ransomware contrast tool☆17Dec 18, 2024Updated last year