☆75May 23, 2025Updated 11 months ago
Alternatives and similar repositories for VULOC
Users that are interested in VULOC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MPC(Multi-Party Computation) all in one.☆142Jan 26, 2026Updated 3 months ago
- ☆143Mar 31, 2025Updated last year
- [开源软件发布]基于蓝牙的病毒追踪系统,采用BLE低功耗蓝牙,通过SM3加密认证保护用户数据安全性,提供包括Android开发,IOS开发,以及Java服务器开发的完整代码和直接可以运行的apk文件☆151Jul 11, 2025Updated 9 months ago
- ☆143Mar 2, 2025Updated last year
- ☆145Mar 31, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆152Apr 28, 2025Updated last year
- A secure IoT authentication framework based on hardware fingerprinting☆157Mar 1, 2025Updated last year
- Code for CVPR 2024 "Revisiting Adversarial Training under Long-Tailed Distributions".☆157Mar 1, 2025Updated last year
- efficient anti side channel SHA3 algorithm software and hardware co-design☆154Apr 21, 2025Updated last year
- ☆140Apr 1, 2025Updated last year
- SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs☆162Apr 21, 2025Updated last year
- ☆149Mar 31, 2025Updated last year
- 基于IFTTT平台的隐私挖掘工具☆51Mar 27, 2025Updated last year
- 本项目基于兼具加密与计算双重能力的全同态加密算法、利用微软开源库Microsoft-Seal而设计出的一套能够保护医疗数据的云计算系统。☆62Mar 31, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆23Mar 13, 2025Updated last year
- datacon比赛2024年漏洞分析赛道解题框架与运行镜像压缩包☆182Jun 10, 2025Updated 10 months ago
- ☆144Aug 14, 2024Updated last year
- The implementation of our AAAI 2024 paper "Reverse Multi-Choice Dialogue Commonsense Inference with Graph-of-Thought"☆195Apr 5, 2025Updated last year
- Code for USENIX Security 2025 paper "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis …☆219Jan 27, 2026Updated 3 months ago
- ☆163Mar 31, 2025Updated last year
- WAScope: Detecting Privacy Data Leakage with Web Application API Confusion☆146Dec 6, 2025Updated 4 months ago
- ☆14Jun 2, 2025Updated 11 months ago
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆14Mar 3, 2022Updated 4 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- Python wrapper to use FlowDroid APK analyzer.☆11Jan 30, 2023Updated 3 years ago
- Private Inference on Transformer☆30Jun 13, 2023Updated 2 years ago
- The official repository for the NLP-KG web application [ACL 2024 Demo].☆14Oct 16, 2025Updated 6 months ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆19Nov 2, 2023Updated 2 years ago
- An analyzer of JNI code that matches native code information with Java code☆23Nov 12, 2021Updated 4 years ago
- 使用BiSeNet做人脸面部解析,包含了基于pytorch, opencv, onnxruntime三种库的程序实现,并且比较了在调用三种库的输入和输出的差异☆15May 7, 2021Updated 4 years ago
- ☆12Aug 5, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 武汉大学国家网安院软件安全☆16Dec 9, 2024Updated last year
- ☆14Apr 3, 2022Updated 4 years ago
- Function-Dependent Preprocessing in MOTION☆14Nov 27, 2023Updated 2 years ago
- An awesome & curated list of autonomous driving security papers☆81Jan 12, 2026Updated 3 months ago
- Source code for paper "ATP: AMRize Than Parse! Enhancing AMR Parsing with PseudoAMRs" @NAACL-2022☆15Mar 31, 2023Updated 3 years ago
- Machine learning algorithms implements with jax for machine learning in production in large scale dataset.☆15Updated this week
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 10 months ago