ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
☆15Aug 16, 2018Updated 7 years ago
Alternatives and similar repositories for ProvChain
Users that are interested in ProvChain are comparing it to the libraries listed below
Sorting:
- ☆18Feb 16, 2023Updated 3 years ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- Repository contains Google colab notebooks used for faceswaping☆30Dec 10, 2019Updated 6 years ago
- Continuous build system used by Mono and Moonlight.☆34Apr 8, 2020Updated 5 years ago
- Java Boneh, Lynn, and Shacham (BLS) Signature Aggregation. Implementation of "Aggregate and Verifiably Encrypted Signatures from Bilinear…☆27Feb 3, 2018Updated 8 years ago
- Something To Do Android Application Security Research☆10May 14, 2021Updated 4 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Blockchain Application on hyperledger fabric for provenance in pharmaceutical supply chain☆13Mar 1, 2018Updated 8 years ago
- a zksnark jni library☆18Oct 3, 2024Updated last year
- Example code to help getting start with SootUp☆14Aug 7, 2025Updated 7 months ago
- Open source code for MobiPurpose project☆13Mar 25, 2025Updated 11 months ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- pairing based cryptography☆16Sep 17, 2018Updated 7 years ago
- 安卓逆向教程、技巧、工具、文档。☆16Mar 23, 2024Updated last year
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- HoneyBadgerBFT in Rust☆10Nov 22, 2017Updated 8 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Jun 17, 2019Updated 6 years ago
- iOS Automation Framework iOS Touch Simulation Library☆14Nov 18, 2024Updated last year
- [ICML 2024] UGrid: An Efficient-And-Rigorous Neural Multigrid Solver for Linear PDEs☆10Aug 7, 2025Updated 7 months ago
- 校园舆情监测系统☆19Oct 21, 2019Updated 6 years ago
- 实战攻击中的badusb脚本☆16Apr 6, 2020Updated 5 years ago
- ☆16May 22, 2015Updated 10 years ago
- ☆29May 4, 2016Updated 9 years ago
- IoT enabled Blockchain Platform: Securely integrate physical assets & IoT devices through blockchain, smart contracts & firmware for crea…☆24Aug 28, 2020Updated 5 years ago
- [NeurIPS2022] Where to Pay Attention in Sparse Training for Feature Selection?☆12Feb 10, 2023Updated 3 years ago
- 贝贝云机场官网地址☆27Dec 17, 2025Updated 3 months ago
- LSSS, ABE☆17Dec 22, 2020Updated 5 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆74Jun 1, 2024Updated last year
- Ardupilot fork fordrone dance controller project by SPH Engineering☆15Sep 5, 2017Updated 8 years ago
- React水印组件,支持图片水印,文字水印。☆34Jan 6, 2018Updated 8 years ago
- Lightweight Cryptographic Framework for Internet of Drones☆19Sep 29, 2018Updated 7 years ago
- ☆14Feb 24, 2020Updated 6 years ago
- ☆20Apr 28, 2022Updated 3 years ago
- [PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Feb 27, 2021Updated 5 years ago
- Webdriver for Chrome☆12Updated this week
- 使用python 和 yixin 来玩五子棋☆13May 21, 2020Updated 5 years ago
- ☆17Jul 20, 2018Updated 7 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆25Feb 10, 2022Updated 4 years ago
- source code of AISTATS 2020 paper: Fully Decentralized Joint Learning of Personalized Models and Collaboration Graphs☆12Jun 21, 2022Updated 3 years ago