wanrenmi / IFTTT_privacy_miningView external linksLinks
基于IFTTT平台的隐私挖掘工具
☆53Mar 27, 2025Updated 10 months ago
Alternatives and similar repositories for IFTTT_privacy_mining
Users that are interested in IFTTT_privacy_mining are comparing it to the libraries listed below
Sorting:
- 本项目基于兼具加密与计算双重能力的全同态加密算法、利用微软开源库Microsoft-Seal而设计出的一套能够保护医疗数据的云计算系统。☆64Mar 31, 2025Updated 10 months ago
- ☆154Apr 28, 2025Updated 9 months ago
- datacon比赛2024年漏洞分析赛道解题框架与运行镜像压缩包☆184Jun 10, 2025Updated 8 months ago
- ☆145Mar 2, 2025Updated 11 months ago
- Code for CVPR 2024 "Revisiting Adversarial Training under Long-Tailed Distributions".☆159Mar 1, 2025Updated 11 months ago
- ☆75May 23, 2025Updated 8 months ago
- MPC(Multi-Party Computation) all in one.☆144Jan 26, 2026Updated 2 weeks ago
- ☆142Apr 1, 2025Updated 10 months ago
- [开源软件发布]基于蓝牙的病毒追踪系统,采用BLE低功耗蓝牙,通过SM3加密认证保护用户数据安全性,提供包括Android开发,IOS开发,以及Java服务器开发的完整代码和直接可以运行的apk文件☆152Jul 11, 2025Updated 7 months ago
- SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs☆164Apr 21, 2025Updated 9 months ago
- efficient anti side channel SHA3 algorithm software and hardware co-design☆156Apr 21, 2025Updated 9 months ago
- ☆151Mar 31, 2025Updated 10 months ago
- ☆24Mar 13, 2025Updated 11 months ago
- A rl-based waf bypass tool☆246Mar 29, 2025Updated 10 months ago
- ☆166Mar 31, 2025Updated 10 months ago
- High-efficiency Secure Two Party Computation on GPU☆174Apr 1, 2025Updated 10 months ago
- The implementation of our AAAI 2024 paper "Reverse Multi-Choice Dialogue Commonsense Inference with Graph-of-Thought"☆198Apr 5, 2025Updated 10 months ago
- Code for USENIX Security 2025 paper "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis …☆221Jan 27, 2026Updated 2 weeks ago
- Coverage gathering JVMTI agent for Android☆26Oct 11, 2023Updated 2 years ago
- ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation☆23Mar 1, 2025Updated 11 months ago
- An Emulator and SDK for Intel SGX extension☆32Mar 6, 2017Updated 8 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- github军火库☆21May 24, 2017Updated 8 years ago
- ☆10Oct 25, 2024Updated last year
- ☆14Jun 2, 2025Updated 8 months ago
- ☆14Mar 2, 2023Updated 2 years ago
- CISSP 8th☆14Apr 9, 2021Updated 4 years ago
- ☆13Apr 8, 2019Updated 6 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Notes for my CISSP study☆10Aug 5, 2022Updated 3 years ago
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆17Sep 5, 2024Updated last year
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated last month
- ☆18Dec 23, 2023Updated 2 years ago
- ☆15Nov 27, 2023Updated 2 years ago
- 算法笔记☆11Nov 15, 2020Updated 5 years ago
- pwn☆12Apr 7, 2019Updated 6 years ago
- A curated list of awesome privacy preserving machine learning resources☆14May 17, 2020Updated 5 years ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆20Jan 23, 2026Updated 3 weeks ago
- 南京大学软件学院操作系统2019届加分项☆11Jun 18, 2018Updated 7 years ago