Detection and Prevention of Phishing
☆10Apr 24, 2019Updated 6 years ago
Alternatives and similar repositories for Phishing_Detection_Using_Python
Users that are interested in Phishing_Detection_Using_Python are comparing it to the libraries listed below
Sorting:
- 实现了垂体瘤、胶质瘤和脑膜瘤的图像分类,先进行CT/MR图像的分类,采用HOG+SVM算法实现,再进行图像识别,采用CNN或者多特征+SVM实现,系统界面pyQT搭建。☆11Jun 23, 2020Updated 5 years ago
- Predicting hit songs on Spotify by classifying 40,000 songs using Machine Learning☆10Jun 29, 2022Updated 3 years ago
- This repo is for Arduino based IOT Project, 'Smart Accident Alert System'. Don't hesitate to give it a if you find it useful.☆10Jan 9, 2019Updated 7 years ago
- ☆15Nov 30, 2022Updated 3 years ago
- U-Net Brain Tumor Segmentation for BraTS 2018☆13Jun 8, 2019Updated 6 years ago
- Image Segmentation using U-Net, U-Net with skip connections and M-Net architectures☆13Jan 13, 2022Updated 4 years ago
- A multi-class image classifier using transfer learning with pytorch.☆15Nov 24, 2018Updated 7 years ago
- AI-generated personalized workout plans.☆13Feb 10, 2024Updated 2 years ago
- This project is developing code to implement features and extensions to the NIST Cybersecurity Whitepaper, "A Data Structure for Integrit…☆23Dec 6, 2022Updated 3 years ago
- A tensorflow2 implementation of Inception_V4, Inception_ResNet_V1 and Inception_ResNet_V2.☆19Oct 8, 2019Updated 6 years ago
- Through NLP and text classification, this project aims to use ML to classify a headline as clickbait or non-clickbait and provide evidenc…☆19Dec 21, 2022Updated 3 years ago
- Layer 4 Firewall for Software Defined Networks☆21Jun 13, 2017Updated 8 years ago
- Myntra-Walmart Hackathon Solution☆22Jan 18, 2022Updated 4 years ago
- Detecting Fake News using AI☆21Dec 10, 2022Updated 3 years ago
- A notebook of awesome privacy protection,federated learning, fairness and blockchain research materials.☆33May 19, 2022Updated 3 years ago
- A Self-Hosted Awesome Network Attack Map | 可以自建的酷炫网络攻击地图☆31Mar 8, 2023Updated 2 years ago
- Realtime face detection and recognition on video streams. Uses Inception-ResNet-v1 as Encoder, trained using Triplet Loss.☆28Feb 22, 2021Updated 5 years ago
- Self-Sovereign Identity Wallet based on Hyperledger Aries☆22Dec 17, 2021Updated 4 years ago
- Self-Sovereign cryptocurrency price discovery tool leveraging Tor.☆36Aug 30, 2023Updated 2 years ago
- Real World Occluded Face dataset containing 3195 neutral images, 1686 sunglasses images and 678 masked images.☆40Nov 29, 2021Updated 4 years ago
- 网络协议攻击之构造畸形数据包☆33Oct 18, 2019Updated 6 years ago
- Colearn is a collection of protocols for running multi-stakeholder machine learning that preserve data privacy☆35May 23, 2023Updated 2 years ago
- Similarity network fusion of features for clean self-similarity matrices in audio, as well as Javascript tools to play SSMs and spring gr…☆41Jul 6, 2023Updated 2 years ago
- A car safety technology that can auto-detect driver drowsiness in real-time. This system can prevent road accidents that are caused by dr…☆45Jul 5, 2021Updated 4 years ago
- Data cleaning, pre-processing, and Analytics on a Health care data using Spark and Python.☆48Jul 19, 2023Updated 2 years ago
- Othello: A lightweight, self-sovereign wallet for the Celo network. Runs on the web and on desktop.☆53Dec 20, 2024Updated last year
- Big data projects implemented by Maniram yadav☆50May 5, 2018Updated 7 years ago
- One-shot Siamese Neural Network, using TensorFlow 2.0, based on the work presented by Gregory Koch, Richard Zemel, and Ruslan Salakhutdin…☆63Sep 27, 2024Updated last year
- python写的一个小爬虫,爬取web of science的文献信息,包含"title","作者全名", "作者简写","关键词","摘要"一切网页上有的信息,并转成CSV信息表格存储。还有下载web of science存有的pdf文献文件功能。☆86Jul 10, 2020Updated 5 years ago
- YOLO for custom object detection and passing the detected objects to Tesseract☆62Oct 17, 2023Updated 2 years ago
- A repository for leveraging Self-Sovereign Identity in applications☆66Oct 14, 2022Updated 3 years ago
- ☆70Feb 10, 2023Updated 3 years ago
- Ideas on how to share private data on a public blockchain☆72Nov 7, 2017Updated 8 years ago
- This repo includes Glioma Segmentation with Mask R-CNN and U-Net.☆70Jan 8, 2020Updated 6 years ago
- Train a simple decision tree classifier to detect websites used for phishing☆81Sep 30, 2016Updated 9 years ago
- A decentralized self sovereign identity solution developed by Jolocom.☆82Mar 21, 2023Updated 2 years ago
- An implementation of Secure Aggregation algorithm based on "Practical Secure Aggregation for Privacy-Preserving Machine Learning (Bonawit…☆92Aug 4, 2019Updated 6 years ago
- UNet for brain tumor segmentation☆111Apr 8, 2023Updated 2 years ago
- An implementation of vggish in keras with tf backend☆123Apr 11, 2021Updated 4 years ago