ChainXim is a blockchain simulator developed by XinLab, which is used to simulate and verify blockchains under different networks and different consensus protocols, and can be designed to assist network attackers in evaluating the security performance of the blockchain.
☆47Mar 12, 2026Updated last week
Alternatives and similar repositories for ChainXim
Users that are interested in ChainXim are comparing it to the libraries listed below
Sorting:
- ☆10Sep 20, 2022Updated 3 years ago
- go-rapidsnark☆23Feb 12, 2026Updated last month
- 自研编程语言编译器前端引擎☆73Mar 9, 2026Updated last week
- Deprecated repository for appchain based on darwinia and substrate☆15May 29, 2019Updated 6 years ago
- Module blockchain built for massive commercial adoption☆14Aug 14, 2025Updated 7 months ago
- Proximity-based Multi-turn Optimization (ProxMO) - Official Implementation☆56Mar 10, 2026Updated last week
- Official Verge Core Source Code Repository☆12Sep 28, 2025Updated 5 months ago
- ☆16Dec 4, 2025Updated 3 months ago
- A scalable, fail fast high throughput service that proxies for two underlying email services and fails over between them☆30Aug 14, 2017Updated 8 years ago
- pbft - Practical Byzantine Fault Tolerance☆12Jul 18, 2015Updated 10 years ago
- Amico is the next generation Autonomous AI Agent Framework tailored for embedded AI devices and multi-agent systems.☆38Mar 5, 2026Updated 2 weeks ago
- HunyuanVideo-Foley: Multimodal Diffusion with Representation Alignment for High-Fidelity Foley Audio Generation.☆27Oct 25, 2025Updated 4 months ago
- Topology data for MEC networks☆17Oct 9, 2021Updated 4 years ago
- Showcasing my 2025 USACO US Open dual perfect scores (1000/1000 in both Gold & Silver divisions) — one of only 8 U.S. high schoolers nati…☆374Feb 22, 2026Updated 3 weeks ago
- Rust PLONK implementation☆39Sep 6, 2024Updated last year
- Mesh networks with marketplace, it is zerotier / tailscale + marketplace, we will build an ecosystem, you will find all production tools …☆35Aug 14, 2022Updated 3 years ago
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Nov 21, 2022Updated 3 years ago
- A curated collection of research papers, models, and resources tracing the evolution from specialized models to unified world models.☆150Feb 8, 2026Updated last month
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆10Nov 21, 2024Updated last year
- BlockSense: Blockchain Based Trustworthy Crowd-sensing Platform☆19May 15, 2023Updated 2 years ago
- Official TensorFlow-based implementation of adversarial attack for super-resolution models☆18Mar 22, 2021Updated 4 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- 答题小助手,无需额外环境依赖,chrome拓展形式,支持市面上大多数答题APP如冲顶大会,百万英雄,花椒直播,芝士超人,黄金十秒,祝你早日冲顶~☆76Sep 3, 2021Updated 4 years ago
- Official implementation of the Odyssey paper "A Probabilistic Fusion Framework for Spoofing Aware Speaker Verification"☆18Jun 24, 2022Updated 3 years ago
- A matrix library for the MicroPython language☆17Feb 14, 2022Updated 4 years ago
- Emulates FCFS, RR, SJF, HPRN scheduling algorithms in an OS☆14Oct 24, 2017Updated 8 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Oct 20, 2021Updated 4 years ago
- Adversarially Robust Transfer Learning with LWF loss applied to the deep feature representation (penultimate) layer☆19Feb 9, 2020Updated 6 years ago
- Source code of "Hold me tight! Influence of discriminative features on deep network boundaries"☆21Dec 10, 2021Updated 4 years ago
- Experiments with pBFT☆22Dec 8, 2017Updated 8 years ago
- Notebooks for IPAM Tutorial, March 15 2019☆24Mar 15, 2019Updated 7 years ago
- ☆41May 13, 2024Updated last year
- Variational Inequality Solvers in Python☆26Jun 2, 2018Updated 7 years ago
- ☆23Dec 18, 2022Updated 3 years ago
- Code for IJCAI 2019 paper "Real-time Adversarial Attack".☆20Jul 4, 2020Updated 5 years ago
- Migrate Xilinx edge AI solution to PYNQ☆17Nov 3, 2020Updated 5 years ago
- Runtime policy enforcement for AI agents. Cryptographic audit trail, human-in-the-loop approvals, kill switch. Zero code changes. …☆233Updated this week
- An implementation of Deep Canonical Correlation Analysis (DCCA) in Keras with tf backend.☆17Sep 4, 2018Updated 7 years ago
- Compact LSTM inference kernel (CLINK) designed in C/HLS for FPGA implementation.☆17Oct 7, 2019Updated 6 years ago