☆19Sep 8, 2023Updated 2 years ago
Alternatives and similar repositories for flower-homomorphic_encryption
Users that are interested in flower-homomorphic_encryption are comparing it to the libraries listed below
Sorting:
- ☆14Jul 11, 2023Updated 2 years ago
- Flower framework for Federated Learning, with Fully Homomorphic Encryption integrated☆13Jun 3, 2024Updated last year
- [arXiv'21] Additively Symmetric Homomorphic Encryption for Cross-Silo Federated Learning☆22Apr 28, 2025Updated 10 months ago
- ☆10Dec 12, 2024Updated last year
- [INFOCOM24' & TDSC25']FedPHE & Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning☆41Aug 31, 2025Updated 6 months ago
- PyTorch implementation of Security-Preserving Federated Learning via Byzantine-Sensitive Triplet Distance☆34Oct 11, 2024Updated last year
- A mathematical and code introduction to the BFV Homomorphic Encryption scheme.☆41Oct 9, 2022Updated 3 years ago
- Exploring Isoform-specific interactions☆12Sep 16, 2025Updated 5 months ago
- Repository containing notebooks that implement different Federated Learning algorithms using PyTorch☆12May 17, 2021Updated 4 years ago
- Source code of "Deep Rank Hashing Network for Cancellable Face Identification"☆12Jul 8, 2022Updated 3 years ago
- Agent Shutton automates the entire blog writing lifecycle, from planning and drafting to editing and publishing.☆30Nov 14, 2025Updated 3 months ago
- Code for paper "Towards Privacy-Preserving, Real-Time and Lossless Feature Matching"☆13Aug 2, 2022Updated 3 years ago
- This is the repository for valuing individual players within pressing situation in football with symbolic regression methods.☆14Mar 12, 2025Updated 11 months ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- A simulation showcasing federated learning with homomorphic encryption☆10Sep 24, 2023Updated 2 years ago
- Course Material for the Tutorial on Privacy Enhancing Technologies and PPML☆13Oct 29, 2021Updated 4 years ago
- Official code for "Federated learning for heterogeneous electronic health record systems with cost effective participant selection"☆12Feb 11, 2026Updated 3 weeks ago
- [ICML'25] MELON: Provable Defense Against Indirect Prompt Injection Attacks in AI Agents☆21Jul 31, 2025Updated 7 months ago
- Fast Training of Support Vector Machines for Survival Analysis☆11Dec 28, 2016Updated 9 years ago
- [ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.☆52Jul 13, 2024Updated last year
- Experiments of the DAI in Healthcare project - skin lesions images use case - using Flower☆12Jun 16, 2022Updated 3 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆20Jan 15, 2017Updated 9 years ago
- ☆13Feb 11, 2019Updated 7 years ago
- Deep Distillation Hashing for Unconstrained Palmprint Recognition☆12Oct 24, 2021Updated 4 years ago
- ☆55Feb 19, 2023Updated 3 years ago
- Open source platform for the privacy-preserving machine learning lifecycle☆17Aug 18, 2023Updated 2 years ago
- Official repository of the paper "Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning".☆12Mar 28, 2022Updated 3 years ago
- Code implementation of the empirical study paper using ViT for AD classification☆14Oct 30, 2024Updated last year
- We provide a friendly foundational platform for beginners who intend to start Federated Learning (FL)☆20May 26, 2025Updated 9 months ago
- Recognizing traffic signs with deep learning and PyTorch using Spatial Transformer Convolutional Neural Networks.☆13May 19, 2021Updated 4 years ago
- Created a fingerprint recognition system using siamese network via On-Shot Learning. It has a similar use case as that of a face-recognit…☆13Oct 19, 2020Updated 5 years ago
- Bridge between TensorFlow and Google's Private Join and Compute library☆16Dec 27, 2022Updated 3 years ago
- Implementation of FedAvg, FedProx and qFedAvg using PyTorch☆18Apr 2, 2024Updated last year
- PyTorch implementation of "Distilling the Knowledge in a Neural Network"☆18Jul 24, 2023Updated 2 years ago
- Implementation of the local and global unlinkability metrics for biometric template protection systems☆20Jun 27, 2019Updated 6 years ago
- ☆15Dec 7, 2023Updated 2 years ago
- Implementation of the Open Diffix anonymization mechanism for PostgreSQL.☆19Dec 18, 2023Updated 2 years ago
- Code for our NAACL2025 accepted paper: Attention Tracker: Detecting Prompt Injection Attacks in LLMs☆23Sep 19, 2025Updated 5 months ago
- Material workbench for the master-level course CS-E4740 "Federated Learning"☆189Feb 25, 2026Updated last week