Lightweight face recognition
☆13Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for face-recognition
Users that are interested in face-recognition are comparing it to the libraries listed below
Sorting:
- In-Contract State Access Control for Fast Vulnerability Detection and Prevention☆12Jun 26, 2023Updated 2 years ago
- Understanding Ethereum(Go version)|理解以太坊: Go-Ethereum 源码剖析☆11Jun 8, 2022Updated 3 years ago
- A small example of how to use the bls-eth-go-binary☆13Oct 18, 2022Updated 3 years ago
- Requesting or listening to ethereum data☆12Jun 27, 2023Updated 2 years ago
- ☆10Mar 17, 2023Updated 2 years ago
- Yunzai-Bot的AI绘图插件,使用stable-diffusion接口☆11Feb 19, 2023Updated 3 years ago
- Learn and share papers about Block Chain☆31Jun 9, 2020Updated 5 years ago
- Template repository for CCF apps☆16Feb 12, 2026Updated 2 weeks ago
- 在论文搜索结果页面显示会议/期刊等级的 Safari 扩展。目前支持在 Springer、 DBLP、IEEExplore 和 ACM DL 上显示 CCF 等级☆11Aug 15, 2025Updated 6 months ago
- A command-line tool to download photos from iCloud☆11Dec 7, 2022Updated 3 years ago
- how to deploy any smart contract and interact with them through API using Golang☆10Feb 7, 2022Updated 4 years ago
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆10Sep 7, 2023Updated 2 years ago
- This is a smart contract, a decentralized system to track debit and credit - a blockchain version of Splitwise☆10May 1, 2022Updated 3 years ago
- Ensures bitwise reproducibility of ML operations across different hardware targets.☆19Mar 4, 2025Updated 11 months ago
- Trajectory Distances Benchmark App☆13Mar 31, 2018Updated 7 years ago
- ☆14Dec 10, 2022Updated 3 years ago
- Code for "LifeLong Incremental Reinforcement Learning (LLIRL)"☆21Jan 28, 2021Updated 5 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- Zero-Knowledge Proofs (ZKP) allow a party to prove knowledge of a value to another party without revealing the actual value. This Python …☆25Jul 3, 2023Updated 2 years ago
- ☆21Aug 30, 2022Updated 3 years ago
- Confidentiality-Preserving Smart Contract Platform☆22Mar 10, 2020Updated 5 years ago
- IForestASD for Anomaly Detection in Scikit-MultiFLow☆28Jun 21, 2020Updated 5 years ago
- 基于 Yunzai 的 AI 绘图插件,使用 Midjourney 接口☆32May 9, 2024Updated last year
- ☆47Oct 19, 2021Updated 4 years ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Dec 13, 2021Updated 4 years ago
- An online learning method used to address concept drift and model drift. Code for the paper entitled "A Lightweight Concept Drift Detecti…☆55Jan 20, 2024Updated 2 years ago
- ☆51Nov 2, 2018Updated 7 years ago
- 浙江大学incas实验室-区块链顶会论文展示☆51Aug 2, 2023Updated 2 years ago
- ☆61Dec 25, 2023Updated 2 years ago
- ☆64Jan 4, 2023Updated 3 years ago
- Geth-in-SGX provides an example of running go-ethereum in SGX☆76Mar 19, 2024Updated last year
- 一个强大的 PHP 参数验证器☆61Feb 7, 2021Updated 5 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 10 months ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- 微信小程序商城, 微信小程序微店,fecshop 微信小程序,☆67Jan 23, 2020Updated 6 years ago
- ☆72Jan 11, 2022Updated 4 years ago
- ☆75Apr 24, 2022Updated 3 years ago
- A programming language and compiler which enable automatic compilation of intuitive data privacy specifications to NIZK-enabled private s…☆88Jan 5, 2024Updated 2 years ago
- Decode one time password (OTP) secrets from QR codes exported by Google Authenticator.☆115May 11, 2024Updated last year