Privacy-preserving multi-pose face recognition system
☆30May 23, 2025Updated 9 months ago
Alternatives and similar repositories for Secure-face-recognition
Users that are interested in Secure-face-recognition are comparing it to the libraries listed below
Sorting:
- 多媒体立体防护平台☆13May 22, 2025Updated 9 months ago
- FortifyPatch: Towards Tamper-resistant Live Patching in Linux-based Hypervisor.☆17Sep 22, 2025Updated 5 months ago
- Put All Mirror in ONE☆12Feb 18, 2026Updated last week
- Used for hardware trojan detection(Based on Trust_Hub)☆10Jul 30, 2019Updated 6 years ago
- The source code of "Deep attention diffusion graph neural networks for text classification"☆13Nov 11, 2023Updated 2 years ago
- ☆14Jul 22, 2024Updated last year
- The source code of "Improved Graph Contrastive Learning for Short Text Classification"☆12Aug 14, 2025Updated 6 months ago
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆13Jan 31, 2024Updated 2 years ago
- In-vehicle gateway intrusion detection based on ARM☆13Jan 26, 2021Updated 5 years ago
- edusrc报告转换☆16Feb 5, 2022Updated 4 years ago
- 4D Fuzzer is a fuzzer for fuzzing programs that use MAVLink written in Python3.☆15Dec 16, 2021Updated 4 years ago
- 10 Days of Statistics Challenges at HackerRank☆12May 17, 2019Updated 6 years ago
- A few resources for fuzzing☆16Sep 25, 2022Updated 3 years ago
- CCF推荐会议论文的获取和推送☆17Jun 3, 2024Updated last year
- This File Contains all solutions of: Hackerrank 30 day of code. You are welcome to add any other variants of them or in other language if…☆24Oct 28, 2022Updated 3 years ago
- ☆26Apr 13, 2022Updated 3 years ago
- 一个AWD批量攻击框架☆25Oct 9, 2020Updated 5 years ago
- 基于Pytorch实现AlexNet\RestNet34,手写数字识别☆23Dec 8, 2022Updated 3 years ago
- Muti-threading version of Finger☆32Apr 8, 2024Updated last year
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Apr 7, 2019Updated 6 years ago
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Sep 11, 2023Updated 2 years ago
- 用于演示Java Web项目中,漏洞的成因及修复方案,可用于黑盒测试和白盒测试,部分修复方案可用于生产环境。☆43Apr 20, 2018Updated 7 years ago
- Use Intel Pin tools to analysis binary.☆38Jul 19, 2015Updated 10 years ago
- ☆55Apr 8, 2024Updated last year
- Dart / Flutter VM snapshot analyzer☆41Nov 30, 2020Updated 5 years ago
- 收集/转帖/整理一些系逆向文件/文章☆63Nov 9, 2024Updated last year
- This is a simple network firewall for pwn challenges of ctf awd competition, light and simple code.There is no dependence, the log format…☆209Nov 10, 2023Updated 2 years ago
- Solutions to Hackerrank's interview preparation kit.☆55Mar 5, 2020Updated 5 years ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆68Nov 26, 2021Updated 4 years ago
- 一个帮助你PHP反序列化的python工具☆71Feb 20, 2026Updated last week
- qemu源码的阅读笔记☆91Aug 13, 2024Updated last year
- 吴恩达机器学习算法Python实现,附详细的代码注释。☆87Oct 9, 2020Updated 5 years ago
- HarmonyOS Next Decompiler(纯血鸿蒙反编译器)☆157Feb 25, 2026Updated last week
- Official source code and writeups of *CTF2022☆75Apr 19, 2022Updated 3 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆103Nov 28, 2023Updated 2 years ago
- A plugin to resolve .plt.sec symbols in IDA☆79Dec 13, 2020Updated 5 years ago
- 自带GUI的一键解鼠标流量/键盘流量小工具☆92Oct 23, 2023Updated 2 years ago
- Data Structures and Algorithms Course for GirlScript Education Outreach Program Batch 1☆88May 4, 2020Updated 5 years ago
- A tool for recognizing function symbol☆489Apr 8, 2024Updated last year