☆54Dec 31, 2024Updated last year
Alternatives and similar repositories for White-box-SM4-algorithm
Users that are interested in White-box-SM4-algorithm are comparing it to the libraries listed below
Sorting:
- Implementation of Matrix Operations over Binary Fields and White-box SM4☆57Dec 31, 2024Updated last year
- FL-EASGD: Federated Learning Privacy Security Method Based on Homomorphic Encryption☆73Dec 25, 2024Updated last year
- ☆71Dec 31, 2024Updated last year
- ☆62Dec 26, 2024Updated last year
- ☆254Mar 31, 2025Updated 11 months ago
- Bilibili(B站,Bili)直播独轮车脚本(Bilibili-Live-Spamer)☆37Updated this week
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- CUMT信息安全专业毕业设计☆37Oct 7, 2023Updated 2 years ago
- Python Levin p2p client☆20Mar 29, 2022Updated 3 years ago
- ☆43Nov 27, 2025Updated 3 months ago
- 基于多种哈希算法和孪生神经网络的短视频相似度检测系统☆26May 31, 2023Updated 2 years ago
- A Peer-to-Peer chatting application created in Python.☆23Apr 4, 2017Updated 8 years ago
- MTL-TabNet: Multi-task Learning based Model for Image-based Table Recognition☆104May 30, 2024Updated last year
- A Siamese CNN for Image Steganalysis☆82Oct 27, 2020Updated 5 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated 2 years ago
- source code of “Visual Saliency Transformer” (ICCV2021)☆146Jan 6, 2023Updated 3 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 8 years ago
- 文 档方向分类☆222Feb 3, 2026Updated last month
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Dec 17, 2020Updated 5 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- [ICLR'24] Democratizing Fine-grained Visual Recognition with Large Language Models☆190Jul 15, 2024Updated last year
- Linux高性能服务器编程(作者 游双) 读书笔记和Demo☆393Mar 25, 2020Updated 5 years ago
- Modern C++ binding for liburing (io_uring) that features C++ coroutines support☆338Jul 30, 2024Updated last year
- Simple pytorch implementation of FGSM and I-FGSM☆293Mar 21, 2018Updated 8 years ago
- Monocular Depth Estimation Using Laplacian Pyramid-Based Depth Residuals☆333Apr 17, 2024Updated last year
- io_uring echo server☆398Jan 20, 2024Updated 2 years ago
- 推荐系统入门指南,全面介绍了工业级推荐系统的理论知识(王树森推荐系统公开课-基于小红书的场景讲解工业界真实的推 荐系统),如何基于TensorFlow2训练模型,如何实现高性能、高并发、高可用的Golang推理微服务。Comprehensively introduced th…☆695Feb 10, 2025Updated last year
- Provable adversarial robustness at ImageNet scale☆407May 20, 2019Updated 6 years ago
- Key/Value Datastore for Persistent Memory☆404Mar 22, 2023Updated 3 years ago
- [NeurIPS 2021] [T-PAMI] DynamicViT: Efficient Vision Transformers with Dynamic Token Sparsification☆652Jul 11, 2023Updated 2 years ago
- ☆579Aug 12, 2024Updated last year
- High Performance Embedded Key-Value Store☆725Mar 12, 2026Updated last week
- SGI STL source code analysis and note from 《STL源码剖析》 by 侯捷(包含电子书、源码注释及测试代码)☆1,034Mar 17, 2020Updated 6 years ago
- 练习下用pytorch来复现下经典的推荐系统模型, 如MF, FM, DeepConn, MMOE, PLE, DeepFM, NFM, DCN, AFM, AutoInt, ONN, FiBiNET, DCN-v2, AFN, DCAP等☆684Mar 14, 2022Updated 4 years ago
- 收集轮子类项目☆1,245May 20, 2023Updated 2 years ago
- Fastest RPC in the west☆760Apr 12, 2023Updated 2 years ago
- Fidelius - YeeZ Privacy Computing 基于可信执行环境的熠智隐私计算中间件☆1,054Updated this week
- Paint by Example: Exemplar-based Image Editing with Diffusion Models☆1,251Nov 28, 2023Updated 2 years ago