☆152Apr 28, 2025Updated last year
Alternatives and similar repositories for MLARandom-repo
Users that are interested in MLARandom-repo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆143Mar 31, 2025Updated last year
- ☆143Mar 2, 2025Updated last year
- MPC(Multi-Party Computation) all in one.☆142Jan 26, 2026Updated 3 months ago
- ☆145Mar 31, 2025Updated last year
- ☆140Apr 1, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- [开源软件发布]基于蓝牙的病毒追踪系统,采用BLE低功耗蓝牙,通过SM3加密认证保护用户数据安全性,提供包括Android开发,IOS开发,以及Java服务器开发的完整代码和直接可以运行的apk文件☆151Jul 11, 2025Updated 9 months ago
- A secure IoT authentication framework based on hardware fingerprinting☆157Mar 1, 2025Updated last year
- SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs☆162Apr 21, 2025Updated last year
- ☆149Mar 31, 2025Updated last year
- A rl-based waf bypass tool☆246Mar 29, 2025Updated last year
- 国密算法的纯 Python 实现.☆307Jan 11, 2026Updated 3 months ago
- ☆75May 23, 2025Updated 11 months ago
- 基于IFTTT平台的隐私挖掘工具☆51Mar 27, 2025Updated last year
- 本项目基于兼具加密与计算双重能力的全同态加密算法、利用微软开源库Microsoft-Seal而设计出的一套能够保护医疗数据的云计算系统。☆62Mar 31, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- datacon比赛2024年漏洞分析赛道解题框架与运行镜像压缩包☆182Jun 10, 2025Updated 10 months ago
- ☆23Mar 13, 2025Updated last year
- High-efficiency Secure Two Party Computation on GPU☆172Apr 1, 2025Updated last year
- ☆144Aug 14, 2024Updated last year
- ☆163Mar 31, 2025Updated last year
- Code for USENIX Security 2025 paper "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis …☆219Jan 27, 2026Updated 3 months ago
- From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning - CVPR 2025☆16Mar 24, 2025Updated last year
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- ☆15Oct 5, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆14Jun 2, 2025Updated 10 months ago
- PDF files of my articles on NSA BIOS backdoor☆24Nov 29, 2017Updated 8 years ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 5 months ago
- An Emulator and SDK for Intel SGX extension☆32Mar 6, 2017Updated 9 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆17Aug 24, 2023Updated 2 years ago
- A library to facilitate the static analysis of Android apps☆13Jul 22, 2025Updated 9 months ago
- Private Inference on Transformer☆30Jun 13, 2023Updated 2 years ago
- Implementation of SoftSpokenOT. Forked from libOTe.☆11May 6, 2024Updated last year
- The official repository for the NLP-KG web application [ACL 2024 Demo].☆14Oct 16, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆37May 19, 2023Updated 2 years ago
- Implementation of a thin hypervisor☆43May 20, 2016Updated 9 years ago
- The official PyTorch implementation of "An Attentional Multi-scale Co-evolving Model for Dynamic Link Prediction" (TheWebConf'23)☆11May 4, 2023Updated 2 years ago
- An analyzer of JNI code that matches native code information with Java code☆23Nov 12, 2021Updated 4 years ago
- Implementation of an X86 mini OS from scratch. Reference: https://github.com/yyu/osfs00☆11Jan 9, 2023Updated 3 years ago
- ☆10Oct 25, 2024Updated last year
- 使用BiSeNet做人脸面部解析,包含了基于pytorch, opencv, onnxruntime三种库的程序实现,并且比较了在调用三种库的输入和输出的差异☆15May 7, 2021Updated 4 years ago