kashifmunir92 / dingoLinks
A multi-modal vector database that supports upserts and vector queries using unified SQL (MySQL-Compatible) on structured and unstructured data, while meeting the requirements of high concurrency and ultra-low latency.
☆12Updated 2 years ago
Alternatives and similar repositories for dingo
Users that are interested in dingo are comparing it to the libraries listed below
Sorting:
- ☆14Updated 3 years ago
- ☆16Updated 2 years ago
- ☆14Updated 4 years ago
- ☆14Updated 3 years ago
- ☆16Updated 2 years ago
- ☆16Updated 3 years ago
- This repository compiles a list of papers related to intellectual property (IP) protection for deep learning models.☆17Updated 11 months ago
- TSQP: Safeguarding Real-Time Inference for Quantization Neural Networks on Edge Devices (Accepted to S&P 2025)☆17Updated 4 months ago
- An Autonomous LLM Agent for Complex Task Solving☆8,498Updated last year
- multi-bit language model watermarking (NAACL 24)☆17Updated last year
- Academic Cooperation Lab☆20Updated 4 months ago
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆21Updated 2 years ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Updated last year
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16Updated last year
- ☆142Updated 10 months ago
- ☆145Updated 11 months ago
- ☆144Updated 10 months ago
- efficient anti side channel SHA3 algorithm software and hardware co-design☆156Updated 9 months ago
- Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature☆29Updated last year
- ☆19Updated last year
- MPC(Multi-Party Computation) all in one.☆144Updated 2 weeks ago
- A new neural distinguisher considering features derived from multiple ciphertext pairs☆12Updated 4 years ago
- This project studied homomorphic encryption and attempted to apply it in training machine learning models. We trained some models on plai…☆13Updated 3 years ago
- A rl-based waf bypass tool☆246Updated 10 months ago
- A secure IoT authentication framework based on hardware fingerprinting☆156Updated 11 months ago
- GAN you see me? enhanced data reconstruction attacks against split inference - NeurIPS 2023☆12Updated 10 months ago
- ☆43Updated last year
- ☆581Updated 7 months ago
- ☆147Updated 10 months ago
- The open-sourced Python toolbox for backdoor attacks and defenses.☆641Updated 4 months ago