helloswx / Understanding-Ethereum-Go-version
Understanding Ethereum(Go version)|理解以太坊: Go-Ethereum 源码剖析
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Understanding-Ethereum-Go-version
- Requesting or listening to ethereum data☆12Updated last year
- Lightweight face recognition☆13Updated last year
- In-Contract State Access Control for Fast Vulnerability Detection and Prevention☆12Updated last year
- A small example of how to use the bls-eth-go-binary☆13Updated 2 years ago
- Source code of paper "TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support"☆19Updated 2 months ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆29Updated 4 years ago
- ☆8Updated last year
- PPA attack code☆12Updated 2 years ago
- Learn and share papers about Block Chain☆32Updated 4 years ago
- FL-based intrusion detection system development using model averaging.☆30Updated last year
- A scalable sharding solution for Blockchain based Federated Learning. SCaFL or ScaleSFL?☆69Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆19Updated 2 months ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆44Updated last month
- PrivacyGuard is a platform that combines blockchain smart contract and TEE to enable transparent enforcement of private data computation …☆27Updated 2 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆49Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆73Updated 2 years ago
- ☆14Updated 2 years ago
- Adaptive Federated Learning Approach to DDoS attack detection☆37Updated 6 months ago
- Federated Learning for Intrusion Detection System using the Flower framework and UNSW_NB15 dataset.☆10Updated 10 months ago
- Source code for the ICDE22 paper "vChain+: Optimizing Verifiable Blockchain Boolean Range Queries"☆19Updated last year
- ☆74Updated last year
- ☆10Updated 5 months ago
- Efficient Dynamic Proof of Retrievability☆11Updated 9 months ago
- 将联邦学习以及知识蒸馏用于搭建网络入侵检测检测模型,在NSL-KDD数据集上进行了验证。☆21Updated last year
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆19Updated 3 years ago
- ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability☆14Updated 6 years ago
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆78Updated last year
- ☆34Updated 2 years ago
- ☆227Updated last week