☆52Mar 24, 2026Updated last month
Alternatives and similar repositories for White-box-SM4-algorithm
Users that are interested in White-box-SM4-algorithm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Matrix Operations over Binary Fields and White-box SM4☆56Dec 31, 2024Updated last year
- FL-EASGD: Federated Learning Privacy Security Method Based on Homomorphic Encryption☆72Dec 25, 2024Updated last year
- ☆70Dec 31, 2024Updated last year
- ☆61Dec 26, 2024Updated last year
- ☆12Oct 28, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An efficient and simplify re-implement TextGCN with Pytorch-geometric.☆13Jul 19, 2021Updated 4 years ago
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆70Oct 27, 2021Updated 4 years ago
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- 睿思BI-OLAP开源多维分析系统☆113Jan 9, 2018Updated 8 years ago
- [NeurIPS 2023] Dynamic Prompt Learning: Addressing Cross-Attention Leakage for Text-Based Image Editing☆111May 15, 2024Updated last year
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- Steganalysis based deep learning☆58May 11, 2020Updated 5 years ago
- a small lightweight std::execution work-alike☆66Mar 26, 2025Updated last year
- Pytorch implementation of the paper Exploring Simple Siamese Representation Learning.☆77Dec 25, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Siamese CNN for Image Steganalysis☆83Oct 27, 2020Updated 5 years ago
- 3rd Place Solution for the OTTO – Multi-Objective Recommender System Competition☆170Feb 15, 2023Updated 3 years ago
- DBA: Distributed Backdoor Attacks against Federated Learning (ICLR 2020)☆205Aug 5, 2021Updated 4 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆102Sep 27, 2022Updated 3 years ago
- ☆556Apr 2, 2024Updated 2 years ago
- [WACV 2024] Training-Free Layout Control with Cross-Attention Guidance☆265Mar 18, 2024Updated 2 years ago
- [CVPR2024 Highlight] Adapting Visual-Language Models for Generalizable Anomaly Detection in Medical Images☆246Apr 6, 2024Updated 2 years ago
- Endurable Transient Inconsistency in Byte-Addressable Persistent B+-Tree☆119Mar 12, 2021Updated 5 years ago
- [ICLR'24] Democratizing Fine-grained Visual Recognition with Large Language Models☆189Jul 15, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An adaptive radix tree for efficient indexing in main memory.☆173Nov 24, 2025Updated 5 months ago
- A PyTorch implementation of the paper "ZigMa: A DiT-Style Mamba-based Diffusion Model" (ECCV 2024)