Bitcoin Core integration/staging tree
☆13Jan 1, 2021Updated 5 years ago
Alternatives and similar repositories for bitcoin
Users that are interested in bitcoin are comparing it to the libraries listed below
Sorting:
- Clustering of pseudoanonymous bitcoin addresses into related entities using structure of the bitcoin transaction graph and de-anonymizati…☆17Nov 8, 2017Updated 8 years ago
- A dockerized component to synchronize BlockSci data to Apache Cassandra☆20Sep 20, 2023Updated 2 years ago
- ☆26Oct 30, 2024Updated last year
- ☆32May 29, 2020Updated 5 years ago
- ☆13May 5, 2023Updated 2 years ago
- Implements rapidchain consensus algorithm☆10Jan 30, 2022Updated 4 years ago
- Evaluation code of our paper in IEEE Transactions on Cognitive Communications and Networking: ''Energy-Efficient Blockchain-enabled User-…☆48Mar 15, 2025Updated 11 months ago
- ☆11Jun 21, 2022Updated 3 years ago
- Hybrid A* Path Planner☆10Apr 20, 2020Updated 5 years ago
- ☆13Feb 11, 2024Updated 2 years ago
- Ilya Sutskever 推荐的30篇Deep learning 必读论文 (中英文对照翻译版)☆13Dec 18, 2024Updated last year
- LEAP (Learning Edges by Aggregation of Paths)☆12Feb 2, 2024Updated 2 years ago
- Dynamic benchmark code for Phys. Rev. E 92, 012805☆10Sep 4, 2015Updated 10 years ago
- Pytorch implementation of XGNN☆10Jan 20, 2021Updated 5 years ago
- academic pages for c2 group☆11Apr 11, 2023Updated 2 years ago
- The Implemention of "Adversarial Attack on Community Detection by Hiding Individuals"☆13Oct 13, 2020Updated 5 years ago
- Subgraph-augmented Path Embedding for Semantic User Search on Heterogeneous Social Network☆13Feb 19, 2018Updated 8 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- Java implementation of DET-ABE, a security scheme that implements the "Digital Envelope Technique", where bulk encryption of files is don…☆13Oct 24, 2016Updated 9 years ago
- Containerized Implementation of LightChain Blockchain (research project)☆12Jun 28, 2021Updated 4 years ago
- ☆19Jan 20, 2023Updated 3 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- This repository contains supplementary data and MATLAB code for "Mechanism Design for Decentralized Peer-to-Peer Energy Trading Consideri…☆17Apr 20, 2022Updated 3 years ago
- Github action for Slither Static Analyser for Solidity smart contracts☆15Feb 19, 2022Updated 4 years ago
- hpv九价疫苗,秒苗脚本☆13Sep 10, 2021Updated 4 years ago
- This paper has been accepted by IEEE MASS 2022.☆15Oct 9, 2023Updated 2 years ago
- A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning☆12Dec 17, 2019Updated 6 years ago
- ☆14Apr 11, 2021Updated 4 years ago
- Extracting graph data from smart contract source code☆13Feb 28, 2023Updated 3 years ago
- ☆16May 27, 2021Updated 4 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- Keeping track of all current cryptocurrency scams in an open-source database☆11Jun 12, 2021Updated 4 years ago
- ☆17Dec 12, 2022Updated 3 years ago
- ☆15Oct 28, 2022Updated 3 years ago
- Codes and data for KDD2020 submission☆17Feb 13, 2020Updated 6 years ago
- BinaryCFGExtractor is an automated tool for extracting binary code control flow graph (CFG).☆18May 23, 2021Updated 4 years ago
- Unsupervised Graph Poisoning Attack via Contrastive Loss Back-propagation, WWW22☆17Jun 30, 2022Updated 3 years ago
- ☆18Oct 19, 2022Updated 3 years ago