In-Contract State Access Control for Fast Vulnerability Detection and Prevention
☆12Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for geth-EVMShield
Users that are interested in geth-EVMShield are comparing it to the libraries listed below
Sorting:
- Lightweight face recognition☆13Jun 26, 2023Updated 2 years ago
- Understanding Ethereum(Go version)|理解以太坊: Go-Ethereum 源码剖析☆11Jun 8, 2022Updated 3 years ago
- A small example of how to use the bls-eth-go-binary☆13Oct 18, 2022Updated 3 years ago
- Requesting or listening to ethereum data☆12Jun 27, 2023Updated 2 years ago
- ☆10Mar 17, 2023Updated 2 years ago
- Yunzai-Bot的AI绘图插件,使用stable-diffusion接口☆11Feb 19, 2023Updated 3 years ago
- Learn and share papers about Block Chain☆31Jun 9, 2020Updated 5 years ago
- Linux SVSM (Secure VM Service Module) for secure x86 virtualization in Rust☆10Sep 7, 2023Updated 2 years ago
- 在论文搜索结果页面显示会议/期刊等级的 Safari 扩展。目前支持在 Springer、 DBLP、IEEExplore 和 ACM DL 上显示 CCF 等级☆11Aug 15, 2025Updated 6 months ago
- This is a smart contract, a decentralized system to track debit and credit - a blockchain version of Splitwise☆10May 1, 2022Updated 3 years ago
- Trajectory Distances Benchmark App☆13Mar 31, 2018Updated 7 years ago
- Ensures bitwise reproducibility of ML operations across different hardware targets.☆19Mar 4, 2025Updated 11 months ago
- ☆14Dec 10, 2022Updated 3 years ago
- Code for "LifeLong Incremental Reinforcement Learning (LLIRL)"☆21Jan 28, 2021Updated 5 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- Zero-Knowledge Proofs (ZKP) allow a party to prove knowledge of a value to another party without revealing the actual value. This Python …☆25Jul 3, 2023Updated 2 years ago
- ☆21Aug 30, 2022Updated 3 years ago
- Confidentiality-Preserving Smart Contract Platform☆22Mar 10, 2020Updated 5 years ago
- Paper Implementation☆27Jun 15, 2024Updated last year
- IForestASD for Anomaly Detection in Scikit-MultiFLow☆28Jun 21, 2020Updated 5 years ago
- ☆47Oct 19, 2021Updated 4 years ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Dec 13, 2021Updated 4 years ago
- 自用Yunzai-bot插件(兼容V2/V3),多为修改适配其他大佬的插件功能☆44Jan 16, 2026Updated last month
- ☆59Jul 10, 2024Updated last year
- 浙江大学incas实验室-区块链顶会论文展示☆51Aug 2, 2023Updated 2 years ago
- ☆51Nov 2, 2018Updated 7 years ago
- ☆61Dec 25, 2023Updated 2 years ago
- Geth-in-SGX provides an example of running go-ethereum in SGX☆76Mar 19, 2024Updated last year
- 一个强大的 PHP 参数验证器☆61Feb 7, 2021Updated 5 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 10 months ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- springboot + mybatis完成简单注册登录。☆68Jun 17, 2022Updated 3 years ago
- Python implementation of the elgamal crypto system☆72Jul 14, 2020Updated 5 years ago
- ☆75Apr 24, 2022Updated 3 years ago
- A programming language and compiler which enable automatic compilation of intuitive data privacy specifications to NIZK-enabled private s…☆88Jan 5, 2024Updated 2 years ago
- Java编写的Web漏洞靶场☆91Dec 19, 2021Updated 4 years ago
- ☆97May 26, 2024Updated last year
- The list data is processed and a new list of alphabetically sorted letters is displayed on RecyclerView(用RecyclerView对数据进行字母排序)☆97Sep 4, 2017Updated 8 years ago
- Official code for "Distributed Deep Learning in Open Collaborations" (NeurIPS 2021)☆117Jan 13, 2022Updated 4 years ago