基于phe库的安全多方计算协议实现
☆11Jun 1, 2022Updated 3 years ago
Alternatives and similar repositories for Secure-Multi-Party-Computation-Protocol
Users that are interested in Secure-Multi-Party-Computation-Protocol are comparing it to the libraries listed below
Sorting:
- 基于安全多方计算的隐私保护系统设计与实现☆50Nov 23, 2021Updated 4 years ago
- Paper Notes in MPC with Applications to PPML☆71Mar 22, 2024Updated last year
- uniapp+Echarts做的微信小程序中国地图☆11Sep 21, 2020Updated 5 years ago
- springboot 代码框架☆10Oct 16, 2022Updated 3 years ago
- ☆10Feb 12, 2018Updated 8 years ago
- AgentSmith is a java agent that reloads your classes while your application is running. It's like JRebel, just much less powerful. It's e…☆15Nov 6, 2012Updated 13 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- [AI6126] Advanced Computer Vision is an elective course of MSAI, SCSE, NTU, Singapore. The repository corresponds to the AI6126 of Semest…☆11Nov 8, 2023Updated 2 years ago
- A Python Library for Paillier Encryption using GMPY2 for arithmetic operations☆12Oct 8, 2018Updated 7 years ago
- A Python library used to transfer files with QR codes. Input a file, get QR code images. Print, email, or otherwise share your codes. Re-…☆10Sep 15, 2019Updated 6 years ago
- 自然语言处理_CCF大数据与计算智能大赛_面向数据安全治理的数据内容智能发现与分级分类☆11Nov 17, 2022Updated 3 years ago
- 一个旨在整理黑客常用工具的GitHub项目☆12Dec 13, 2023Updated 2 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- Android官方实例的中文注解------RecyclerView☆20Dec 11, 2014Updated 11 years ago
- 微博淘宝客项目☆10May 31, 2017Updated 8 years ago
- Code for CVPR24 Paper - Resource-Efficient Transformer Pruning for Finetuning of Large Models☆12Oct 31, 2025Updated 4 months ago
- 【非本人项目】通过python获取抖音直播弹幕、点赞、礼物等信息☆11Apr 19, 2024Updated last year
- icml24☆14Feb 24, 2025Updated last year
- DataCastle - 融360用户贷款风险预测☆10Mar 11, 2017Updated 8 years ago
- A oversampling approach☆11Nov 21, 2018Updated 7 years ago
- DoraNetwork BlockChain Core Project(Dora Network)☆15Nov 9, 2018Updated 7 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- This project studied homomorphic encryption and attempted to apply it in training machine learning models. We trained some models on plai…☆13Aug 23, 2022Updated 3 years ago
- 基于同态加密的联邦学习安全聚合系统☆49Mar 8, 2021Updated 4 years ago
- Code for the CCS'22 paper "Federated Boosted Decision Trees with Differential Privacy"☆55Oct 19, 2023Updated 2 years ago
- PyTorch implementation of Fast-Convergent Federated Learning via Cyclic Aggregation, including FedAvg, FedProx, MOON, and FedRS☆15Jun 28, 2023Updated 2 years ago
- CodeEditor with plugins☆13Jan 19, 2017Updated 9 years ago
- THU-AIR 联邦学习隐私与安全☆13Jun 26, 2023Updated 2 years ago
- An implementation of pneumonia medical X-ray image classification problem using Federated Learning in PySyft.☆12Jun 16, 2019Updated 6 years ago
- A Python implementation of the threshold variant of the Damgard-Jurik cryptosystem.☆15May 4, 2021Updated 4 years ago
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12May 7, 2022Updated 3 years ago
- Differentially Private Synthetic Data Generation [DP-SDG] - Experimental Setups & Knowledge Base - WORK IN PROGRESS☆12Jul 26, 2022Updated 3 years ago
- ☆13May 19, 2025Updated 9 months ago
- ☆13Jun 20, 2025Updated 8 months ago
- ☆14Aug 17, 2024Updated last year
- Unsupervised Domain Adaptation by Backpropagation☆16Mar 30, 2020Updated 5 years ago
- An implementation of the NTRU encryption and decryption algorithm in Python 3☆16Sep 29, 2024Updated last year
- Build your own AI friend☆17Oct 23, 2025Updated 4 months ago