Lightweight face recognition
☆13Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for face-recognition
Users that are interested in face-recognition are comparing it to the libraries listed below
Sorting:
- In-Contract State Access Control for Fast Vulnerability Detection and Prevention☆12Jun 26, 2023Updated 2 years ago
- Understanding Ethereum(Go version)|理解以太坊: Go-Ethereum 源码剖析☆11Jun 8, 2022Updated 3 years ago
- A small example of how to use the bls-eth-go-binary☆13Oct 18, 2022Updated 3 years ago
- Requesting or listening to ethereum data☆12Jun 27, 2023Updated 2 years ago
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆10Sep 7, 2023Updated 2 years ago
- Trajectory Distances Benchmark App☆13Mar 31, 2018Updated 7 years ago
- ☆10Mar 17, 2023Updated 3 years ago
- Template repository for CCF apps☆17Feb 12, 2026Updated last month
- Learn and share papers about Block Chain☆31Jun 9, 2020Updated 5 years ago
- A command-line tool to download photos from iCloud☆11Dec 7, 2022Updated 3 years ago
- Yunzai-Bot的AI绘图插件,使用stable-diffusion接口☆11Feb 19, 2023Updated 3 years ago
- 在论文搜索结果页面显示会议/期刊等级的 Safari 扩展。目前支持在 Springer、 DBLP、IEEExplore 和 ACM DL 上显示 CCF 等级☆12Aug 15, 2025Updated 7 months ago
- the GHOST protocol implementation on solidity.☆22Jun 4, 2019Updated 6 years ago
- Code for "LifeLong Incremental Reinforcement Learning (LLIRL)"☆21Jan 28, 2021Updated 5 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- zjut master thesis☆11Mar 15, 2024Updated 2 years ago
- ☆21Aug 30, 2022Updated 3 years ago
- Confidentiality-Preserving Smart Contract Platform☆22Mar 10, 2020Updated 6 years ago
- Zero-Knowledge Proofs (ZKP) allow a party to prove knowledge of a value to another party without revealing the actual value. This Python …☆25Jul 3, 2023Updated 2 years ago
- ☆14Dec 10, 2022Updated 3 years ago
- Go EVM extracted from go-ethereum☆46Jun 20, 2018Updated 7 years ago
- Paper Implementation☆27Jun 15, 2024Updated last year
- IForestASD for Anomaly Detection in Scikit-MultiFLow☆28Jun 21, 2020Updated 5 years ago
- EGo is an open-source SDK that enables you to develop your own confidential apps in the Go programming language.☆581Updated this week
- ☆61Dec 25, 2023Updated 2 years ago
- ☆60Jul 10, 2024Updated last year
- An online learning method used to address concept drift and model drift. Code for the paper entitled "A Lightweight Concept Drift Detecti…☆55Jan 20, 2024Updated 2 years ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Dec 13, 2021Updated 4 years ago
- ☆51Nov 2, 2018Updated 7 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆57Oct 19, 2023Updated 2 years ago
- 浙江大学incas实验室-区块链顶会论文展示☆51Aug 2, 2023Updated 2 years ago
- ☆47Oct 19, 2021Updated 4 years ago
- 基于 Yunzai 的 AI 绘图插件,使用 Midjourney 接口☆32May 9, 2024Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- ☆75Apr 24, 2022Updated 3 years ago
- A programming language and compiler which enable automatic compilation of intuitive data privacy specifications to NIZK-enabled private s…☆88Jan 5, 2024Updated 2 years ago
- Java编写的Web漏洞靶场☆90Dec 19, 2021Updated 4 years ago
- 一个强大的 PHP 参数验证器☆61Feb 7, 2021Updated 5 years ago