implementation of seren
☆12Dec 8, 2024Updated last year
Alternatives and similar repositories for Searchable-encryption-Seren
Users that are interested in Searchable-encryption-Seren are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code repository for the paper at USENIX Security'24☆37Aug 11, 2024Updated last year
- 上海交通大学开题报告/中期报告LaTeX模板(非官方) Shanghai Jiao Tong University LaTeX templates for thesis proposals and annual reports (unofficial)☆164Jan 25, 2026Updated 3 months ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- Python wrapper for the PBC (Pairing-Based Cryptography) library☆15Jan 16, 2026Updated 3 months ago
- xdu自动填报&邮件推送☆10Dec 8, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589☆26Apr 7, 2022Updated 4 years ago
- Transformer Model to detect deepfakes from popular datasets. Predictions made on embeddings (features) generated by a different ViT model…☆14Nov 27, 2023Updated 2 years ago
- ☆15Mar 13, 2021Updated 5 years ago
- Official implementation of T2Vs Meet VLMs: A Scalable Multimodal Dataset for Visual Harmfulness Recognition☆20Oct 23, 2024Updated last year
- [S&P 2026] SoK: Evaluating Jailbreak Guardrails for Large Language Models☆39Dec 17, 2025Updated 4 months ago
- Official implement of ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection.☆15Jan 18, 2024Updated 2 years ago
- Trajectory Distances Benchmark App☆13Mar 31, 2018Updated 8 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- 🚀 Text2Grad: Converting natural language feedback into gradient signals for precise model optimization. Revolutionizing RLHF with span-l…☆34Feb 6, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 2024王道数据结构的代码实现☆29Dec 19, 2023Updated 2 years ago
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- MATLAB scripts for efficient template attacks☆15Apr 20, 2018Updated 8 years ago
- Source code for the paper "Towards Semantic-Aware Multiple-Aspect Trajectory Similarity Measuring"☆16Jul 29, 2020Updated 5 years ago
- ☆13Jul 11, 2019Updated 6 years ago
- Secure Computation Utilities☆17Mar 5, 2026Updated 2 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Feb 25, 2024Updated 2 years ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Nov 24, 2021Updated 4 years ago
- Implementation of Evo-Memory style learning for LLM agents. Agents learn from outcomes, refine strategies, and get smarter with every tas…☆47Dec 3, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Simple C++ reader for CIFAR-10 dataset☆17Apr 29, 2023Updated 3 years ago
- Bloom filter implementation☆47Mar 30, 2026Updated last month
- New home for LaTeX package bundle thmtools☆21Nov 4, 2024Updated last year
- ☆21Jun 24, 2022Updated 3 years ago
- ☆23Apr 9, 2024Updated 2 years ago
- Continual Learning Method RAWM for ICML 2023☆23Sep 26, 2024Updated last year
- This is a general framework for fake audio detection using pytorch lightning☆30Jul 24, 2025Updated 9 months ago
- Example of using Flask on App Engine to make a simple todo list.☆75Sep 18, 2010Updated 15 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Jun 27, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆19Oct 6, 2020Updated 5 years ago
- This is the pytorch implementation of our work titled "An Efficient Temporary Deepfake Location Approach Based Embeddings for Partially S…☆22Nov 2, 2024Updated last year
- Automatic Identification of Cryptographic Primitives in Software☆32Mar 14, 2015Updated 11 years ago
- 攻防世界逆向题☆28Dec 30, 2020Updated 5 years ago
- MultiArchKernelBench: A Multi-Platform Benchmark for Kernel Generation☆52Mar 25, 2026Updated last month
- 将数据通过mqtt推送到服务端,支持windows及linux操作系统☆12Jan 15, 2025Updated last year
- [ICLR 2025] Official implementation for "SafeWatch: An Efficient Safety-Policy Following Video Guardrail Model with Transparent Explanati…☆44Feb 11, 2025Updated last year