基于IFTTT平台的隐私挖掘工具
☆51Mar 27, 2025Updated last year
Alternatives and similar repositories for IFTTT_privacy_mining
Users that are interested in IFTTT_privacy_mining are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 本项目基于兼具加密与计算双重能力的全同态加密算法、利用微软开源库Microsoft-Seal而设计出的一套能够保护医疗数据的云计算系统。☆62Mar 31, 2025Updated last year
- ☆152Apr 28, 2025Updated 11 months ago
- ☆143Mar 2, 2025Updated last year
- Code for CVPR 2024 "Revisiting Adversarial Training under Long-Tailed Distributions".☆157Mar 1, 2025Updated last year
- ☆143Mar 31, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- MPC(Multi-Party Computation) all in one.☆142Jan 26, 2026Updated 2 months ago
- ☆140Apr 1, 2025Updated last year
- [开源软件发布]基于蓝牙的病毒追踪系统,采用BLE低功耗蓝牙,通过SM3加密认证保护用户数据安全性,提供包括Android开发,IOS开发,以及Java服务器开发的完整代码和直接可以运行的apk文件☆150Jul 11, 2025Updated 9 months ago
- efficient anti side channel SHA3 algorithm software and hardware co-design☆154Apr 21, 2025Updated 11 months ago
- SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs☆162Apr 21, 2025Updated 11 months ago
- ☆74May 23, 2025Updated 10 months ago
- ☆149Mar 31, 2025Updated last year
- ☆145Mar 31, 2025Updated last year
- ☆23Mar 13, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A rl-based waf bypass tool☆245Mar 29, 2025Updated last year
- ☆145Aug 14, 2024Updated last year
- ☆164Mar 31, 2025Updated last year
- High-efficiency Secure Two Party Computation on GPU☆173Apr 1, 2025Updated last year
- The implementation of our AAAI 2024 paper "Reverse Multi-Choice Dialogue Commonsense Inference with Graph-of-Thought"☆196Apr 5, 2025Updated last year
- ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation☆25Mar 1, 2025Updated last year
- PDF files of my articles on NSA BIOS backdoor☆24Nov 29, 2017Updated 8 years ago
- An Emulator and SDK for Intel SGX extension☆32Mar 6, 2017Updated 9 years ago
- Coverage gathering JVMTI agent for Android☆25Oct 11, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The official repository for the NLP-KG web application [ACL 2024 Demo].☆14Oct 16, 2025Updated 6 months ago
- ☆14Jun 2, 2025Updated 10 months ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- ☆15Nov 27, 2023Updated 2 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- ☆110Aug 23, 2023Updated 2 years ago
- ☆15Mar 2, 2023Updated 3 years ago
- Graph Transformers for Large Graphs☆22Apr 26, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Neural Network for classifying movie reviews as positive/negative using IMDB dataset☆12Feb 2, 2021Updated 5 years ago
- 算法笔记☆11Nov 15, 2020Updated 5 years ago
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- WHU大二 计算机设计 流水线CPU设计 课程作业☆13Mar 11, 2025Updated last year
- Bringing Mandatory Access Control to Android apps☆11Dec 20, 2021Updated 4 years ago
- ☆13Apr 9, 2025Updated last year
- Joern Workshops☆32Jan 16, 2025Updated last year