☆24May 25, 2024Updated last year
Alternatives and similar repositories for eaas-privacy
Users that are interested in eaas-privacy are comparing it to the libraries listed below
Sorting:
- ☆18Dec 30, 2025Updated 2 months ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Mar 19, 2024Updated last year
- ☆12Aug 4, 2018Updated 7 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- TKDE'23: A Survey and Experimental Study on Privacy-Preserving Trajectory Data Publishing☆12May 5, 2023Updated 2 years ago
- Continuous Pipelined Speculative Decoding☆16Jan 4, 2026Updated 2 months ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last week
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- [NeurIPS'24] Official implement of "PrivCirNet: Efficient Private Inference via Block Circulant Transformation"☆15Feb 26, 2026Updated last week
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Jan 9, 2025Updated last year
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- FEM micromagnetic simulator☆11Feb 26, 2026Updated last week
- A curated collection of papers and related projects on using LLMs for privacy.☆25Oct 8, 2025Updated 4 months ago
- Two-party Privacy-preserving Neural Network Training using Split Learning and Homomorphic Encryption (CKKS Scheme)☆11Sep 23, 2025Updated 5 months ago
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- MATLAB toolbox for performing modal analysis using experimental data☆11Jun 23, 2022Updated 3 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- 这是俺最近搞的,可以从百度地图上爬取一些城市的地点信息和路线规划用来做旅游推荐( ﹁ ﹁ ) ~→SQL文件会在月底左右加上的( •̀ ω •́ )y☆13Aug 24, 2019Updated 6 years ago
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- Recurrent Neural Networks With Limited Numerical Precision☆13May 25, 2017Updated 8 years ago
- A Python implementation of the non_iid tests in SP800-90B.☆13Aug 2, 2021Updated 4 years ago
- The Ranflood ransomware contrast tool☆17Dec 18, 2024Updated last year
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- [ICLR 2026] The official implementation of the paper "MLP Memory: A Retriever-Pretrained Memory for Large Language Models".☆49Jan 28, 2026Updated last month
- Code for NDSS '25 paper "Passive Inference Attacks on Split Learning via Adversarial Regularization"☆13Sep 16, 2024Updated last year
- PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)☆18Mar 29, 2024Updated last year
- A minifilter driver to capture processes behavior from a filesystem prospective.☆16Oct 5, 2024Updated last year
- ☆14Aug 19, 2024Updated last year
- ☆14May 23, 2023Updated 2 years ago