blog landing page(threejs + Typescript + blender)
☆14Sep 20, 2024Updated last year
Alternatives and similar repositories for buffalo
Users that are interested in buffalo are comparing it to the libraries listed below
Sorting:
- Robot code for the 2024 season, Crescendo, by FRC team Hamosad 1657.☆10Jun 10, 2024Updated last year
- ☆16Jan 31, 2025Updated last year
- Create paraphrasing korean sentence with GPT-3☆34Jan 30, 2023Updated 3 years ago
- With recent advances in both Artificial Intelligence (AI) and Internet of Things (IoT) capabilities, it is more possible than ever to imp…☆16May 17, 2022Updated 3 years ago
- ☆42Jan 22, 2021Updated 5 years ago
- "Will You Be My Valentine?" is a web-based application that presents users with the question "Will you be my valentine?" followed by two …☆66Feb 14, 2024Updated 2 years ago
- ☆16May 12, 2025Updated 9 months ago
- IoT Safe Middleware implements a set of API to support interactions with GSMA IoT Safe Applet on a SIM.☆14Jun 17, 2025Updated 8 months ago
- Privacy First Toolbox For Developers 🧰☆10Jun 6, 2022Updated 3 years ago
- ☆13Jun 3, 2024Updated last year
- python faceDetectionDNNMultiThread.py --prototxt deploy.prototxt.txt --model res10_300x300_ssd_iter_140000.caffemodel☆17Jul 29, 2019Updated 6 years ago
- Standby display for iPhone, iPadOS and MacOS☆14Oct 30, 2023Updated 2 years ago
- Subin An's CV☆12Nov 12, 2022Updated 3 years ago
- Personal site & blog.☆17Apr 20, 2025Updated 10 months ago
- ☆14Jul 15, 2024Updated last year
- Anomaly Detection From Human Pose in Video Surveillance Data☆15May 24, 2019Updated 6 years ago
- Personal portfolio website! 🎉☆15Jan 13, 2026Updated last month
- ☆66Feb 24, 2026Updated last week
- Restaurant Recommender System☆15May 5, 2022Updated 3 years ago
- ☆20Jun 30, 2023Updated 2 years ago
- The internship report highlights the major works carried out by the author in terms of academic and non-academic perspectives. The scope …☆19May 10, 2022Updated 3 years ago
- Etherscan is a popular Ethereum blockchain explorer that help user to access Ethereum transactions and blocks.☆20Apr 16, 2023Updated 2 years ago
- 🧩 Collection of CTF challenges written by me☆19Mar 30, 2025Updated 11 months ago
- Python implementation of MPC threshold signatures☆26Feb 13, 2023Updated 3 years ago
- BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software☆18Oct 10, 2023Updated 2 years ago
- ☆19Jul 1, 2020Updated 5 years ago
- Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC si…☆30Apr 6, 2025Updated 10 months ago
- this projet aims to automate surveillance using the Raspberry Pi computer and its camera module . This project was inspired by other old…☆22Feb 12, 2022Updated 4 years ago
- Crypto Multi-party Computation☆23Jun 14, 2022Updated 3 years ago
- USB Killer Program With Autorun☆33Sep 21, 2022Updated 3 years ago
- ☆112May 2, 2025Updated 10 months ago
- Implementation of RealFormer using pytorch☆101Dec 27, 2020Updated 5 years ago
- Master's thesis in Data Sciences. Comparison and proposal of enhancement for "Real-world anomaly detection in surveillance videos"☆26Jul 6, 2023Updated 2 years ago
- ⚡ My personal website, built with astro.☆26Mar 21, 2025Updated 11 months ago
- ☆50Dec 20, 2025Updated 2 months ago
- ☆30Oct 7, 2024Updated last year
- Detect guns from images, videos and live videos using Tensorflow Object Detection API.☆33Dec 10, 2019Updated 6 years ago
- Portfolio Website v1☆37Jun 15, 2025Updated 8 months ago
- ☆35Feb 21, 2023Updated 3 years ago