vt-asaplab / vPINView external linksLinks
Privacy-Preserving Verifiable Neural Network Inference Service
☆16Sep 6, 2025Updated 5 months ago
Alternatives and similar repositories for vPIN
Users that are interested in vPIN are comparing it to the libraries listed below
Sorting:
- [NeurIPS'24] Official implement of "PrivCirNet: Efficient Private Inference via Block Circulant Transformation"☆14May 28, 2025Updated 8 months ago
- Machine learning model for detecting DDoS attacks, CIC-DDoS2019 dataset☆22Nov 25, 2024Updated last year
- Efficient Dynamic Proof of Retrievability☆16Feb 12, 2024Updated 2 years ago
- ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline☆20Jul 14, 2023Updated 2 years ago
- 该项目实现了隐私保护和可验证的卷积神经网络(CNN)测试,旨在使模型开发者能够在多个测试者提供的非公开数据上向用户证明CNN性能的真实性,同时保护模型和数据的隐私。☆15Oct 23, 2023Updated 2 years ago
- [NeurIPS 2023] Code base for the Renyi Kernel Entropy (RKE) metric for generative models.☆13Jun 18, 2025Updated 7 months ago
- WebRTCを使ってブラウザ間通信を行うオンセツール ユドナリウムの変更版ユドナリウムリリィです☆18Jan 22, 2026Updated 3 weeks ago
- ☆13Dec 2, 2024Updated last year
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated 10 months ago
- ☆11Nov 10, 2025Updated 3 months ago
- Code for the paper: Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions☆11Mar 13, 2024Updated last year
- A library for lattice-based homomorphic encryption in Go☆14May 15, 2022Updated 3 years ago
- The first range filter to simultaneously offer dynamicity, fast operations, and a robust false positive rate for any workload.☆12Jul 15, 2025Updated 6 months ago
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Jan 9, 2025Updated last year
- Experimental port of the TFHE fully homomorphic encryption scheme to Rust.☆12Aug 15, 2022Updated 3 years ago
- A basic implementation of a SAT attack on logic locking.☆13Jun 30, 2021Updated 4 years ago
- Code for the CVPR '23 paper, "Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning"☆10Jun 9, 2023Updated 2 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆19Mar 16, 2022Updated 3 years ago
- ASM generation tool for GAS/NASM/MASM with Xbyak-like syntax in Python☆12Nov 10, 2025Updated 3 months ago
- ☆12Jan 31, 2026Updated 2 weeks ago
- Daily LeetCode problems, 26 coding patterns. Track progress, improve skills. No login, data stays safe.☆12May 7, 2024Updated last year
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- ☆16Updated this week
- ☆14May 23, 2023Updated 2 years ago
- Fast transforms over finite fields☆13Jul 17, 2021Updated 4 years ago
- TFHE is a popular algorithm for homomorphic encryption. Staring with a C/C++ specification of TFHE to be provided, This project rewrite t…☆19May 27, 2024Updated last year
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16May 12, 2024Updated last year
- An R package for monitoring the trend of daily COVID-19 positive cases in Tokyo☆14Aug 13, 2021Updated 4 years ago
- ☆23Mar 17, 2025Updated 10 months ago
- Easy insertion of unicode math symbols☆11May 24, 2025Updated 8 months ago
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Feb 11, 2020Updated 6 years ago
- ☆15Mar 7, 2024Updated last year
- Crypto-Convolutional Neural Network library written on top of SEAL 2.3.1☆14Oct 20, 2019Updated 6 years ago
- ☆19Nov 27, 2024Updated last year
- ☆14Feb 11, 2022Updated 4 years ago
- SubRISC: Simple Instruction-Set Computer for IoT edge devices☆16Jun 27, 2018Updated 7 years ago
- Using Windows OSK with Steamdeck Touchpad (like steamos does)☆13Jul 13, 2023Updated 2 years ago
- ☆14Aug 19, 2021Updated 4 years ago
- Cracks numeric passwords of password-protected PDF files using bruteforce☆14May 15, 2025Updated 8 months ago