Results and data from the paper "We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy"
☆13Jul 29, 2020Updated 5 years ago
Alternatives and similar repositories for we-value-your-privacy
Users that are interested in we-value-your-privacy are comparing it to the libraries listed below
Sorting:
- ☆11Dec 8, 2022Updated 3 years ago
- ☆10Apr 8, 2022Updated 3 years ago
- ☆10Sep 17, 2025Updated 5 months ago
- Symmetric JavaScript☆13Jul 12, 2017Updated 8 years ago
- A DevTools extension for inspecting the viewability of Ad Manager Ads.☆17Feb 7, 2026Updated 3 weeks ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- 📖SupermanDict is an dictionary app for searching the Chinese meaning of an English word.☆11Mar 6, 2018Updated 7 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 6 years ago
- ☆11Jul 8, 2024Updated last year
- ☆10Jan 3, 2023Updated 3 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Extending Storage Access API (SAA) to non-cookie storage☆12May 29, 2025Updated 9 months ago
- ☆11Jul 12, 2022Updated 3 years ago
- Repository for code from "On Adversarial Removal of Hypothesis-only Bias in Natural Language Inference" (StarSem 2019) and "Don’t Take th…☆15Apr 6, 2020Updated 5 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Jan 29, 2026Updated last month
- HMM(隐马尔科夫)模型实现词性标注和分词☆10Sep 28, 2017Updated 8 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- Complete Internal List of Yandex Ranking Factors. There are over 1900 individual ranking factors listed, starting at “PageRank☆12Jan 27, 2023Updated 3 years ago
- ☆11May 6, 2022Updated 3 years ago
- The code for domain-robust language identification with adversarial loss☆15May 29, 2018Updated 7 years ago
- ☆13Dec 16, 2018Updated 7 years ago
- POI微信小程序☆12Sep 12, 2018Updated 7 years ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- The implementation of paper "Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks"☆13Jun 17, 2021Updated 4 years ago
- An eMail newsletter privacy analysis framework☆11Jan 22, 2022Updated 4 years ago
- A simple and efficient llama3 local service deployment solution that supports real-time streaming response and is optimized for common Ch…☆13Jul 31, 2024Updated last year
- OpenAI Gym environment for the game HaxBall☆11Feb 9, 2025Updated last year
- ☆10Jan 2, 2020Updated 6 years ago
- Censored tweets annotated for specificity; AAAI 2019 paper: Predicting and Analyzing Language Specificity in Social Media Posts☆10Oct 19, 2021Updated 4 years ago
- Let's learn Beam, processing Movie Lens 20m datas. Get top three genres for each user☆14Aug 26, 2018Updated 7 years ago
- insight data engineering fellow project☆16Nov 14, 2016Updated 9 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- Episode 215 - Pagination Queries with Firestore & SvelteFire☆15Jan 9, 2023Updated 3 years ago
- Post-Spectre Web Development☆18Jun 30, 2023Updated 2 years ago
- Webcrawler to collect cookie data and usage purposes, built using OpenWPM.☆13Jun 3, 2023Updated 2 years ago
- 🐉 Pipeline runner for matching decompilation☆33Feb 23, 2026Updated last week
- FuzzCoAP - Fuzzing for Robustness and Security Testing of CoAP Servers☆12Jun 23, 2018Updated 7 years ago
- Sample KEDA example for GCP PubSub☆18Jan 25, 2022Updated 4 years ago