In-Contract State Access Control for Fast Vulnerability Detection and Prevention
☆12Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for geth-EVMShield
Users that are interested in geth-EVMShield are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lightweight face recognition☆13Jun 26, 2023Updated 2 years ago
- Understanding Ethereum(Go version)|理解以太坊: Go-Ethereum 源码剖析☆11Jun 8, 2022Updated 3 years ago
- A small example of how to use the bls-eth-go-binary☆13Oct 18, 2022Updated 3 years ago
- Requesting or listening to ethereum data☆12Jun 27, 2023Updated 2 years ago
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆10Sep 7, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Trajectory Distances Benchmark App☆13Mar 31, 2018Updated 8 years ago
- ☆10Mar 17, 2023Updated 3 years ago
- Template repository for CCF apps☆16Feb 12, 2026Updated 2 months ago
- how to deploy any smart contract and interact with them through API using Golang☆10Feb 7, 2022Updated 4 years ago
- Learn and share papers about Block Chain☆31Jun 9, 2020Updated 5 years ago
- A command-line tool to download photos from iCloud☆11Dec 7, 2022Updated 3 years ago
- Yunzai-Bot的AI绘图插件,使用stable-diffusion接口☆11Feb 19, 2023Updated 3 years ago
- the GHOST protocol implementation on solidity.☆22Jun 4, 2019Updated 6 years ago
- Code for "LifeLong Incremental Reinforcement Learning (LLIRL)"☆21Jan 28, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- Confidentiality-Preserving Smart Contract Platform☆22Mar 10, 2020Updated 6 years ago
- Zero-Knowledge Proofs (ZKP) allow a party to prove knowledge of a value to another party without revealing the actual value. This Python …☆25Jul 3, 2023Updated 2 years ago
- IForestASD for Anomaly Detection in Scikit-MultiFLow☆28Jun 21, 2020Updated 5 years ago
- EGo is an open-source SDK that enables you to develop your own confidential apps in the Go programming language.☆584Mar 17, 2026Updated last month
- ☆61Dec 25, 2023Updated 2 years ago
- ☆61Jul 10, 2024Updated last year
- An online learning method used to address concept drift and model drift. Code for the paper entitled "A Lightweight Concept Drift Detecti…☆55Jan 20, 2024Updated 2 years ago
- The list data is processed and a new list of alphabetically sorted letters is displayed on RecyclerView(用RecyclerView对数据进行字母排序)☆97Sep 4, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Geth-in-SGX provides an example of running go-ethereum in SGX☆78Mar 19, 2024Updated 2 years ago
- 浙江大学incas实验室-区块链顶会论文展示☆51Aug 2, 2023Updated 2 years ago
- ☆46Oct 19, 2021Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆75Apr 6, 2025Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆75Sep 25, 2023Updated 2 years ago
- 自用Yunzai-bot插件(兼容V2/V3),多为修改适配其他大佬的插件功能☆44Mar 20, 2026Updated last month
- ☆76Apr 24, 2022Updated 4 years ago
- Run JavaScript inside an Intel SGX Enclave as easily as using a Web Worker☆103Jan 30, 2024Updated 2 years ago
- Java编写的Web漏洞靶场☆90Dec 19, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 一个强大的 PHP 参数验证器☆61Feb 7, 2021Updated 5 years ago
- Code for Dynamic Weights in Multi-Objective Deep Reinforcement Learning☆105May 5, 2023Updated 2 years ago
- 微信小程序商城, 微信小程序微店,fecshop 微信小程序,☆67Jan 23, 2020Updated 6 years ago
- Verifiable Random Function (VRF) library written in Solidity☆101May 17, 2022Updated 3 years ago
- offical implementation of TKDE paper "Deep isolation forest for anomaly detection"☆113Jun 17, 2024Updated last year
- Drebin - NDSS 2014 Re-implementation☆107Dec 20, 2017Updated 8 years ago
- List of implementation of SOTA deep anomaly detection methods☆109Dec 28, 2021Updated 4 years ago