Source code of "Deep Rank Hashing Network for Cancellable Face Identification"
☆12Jul 8, 2022Updated 3 years ago
Alternatives and similar repositories for DeepRankHashing4CancellableFace
Users that are interested in DeepRankHashing4CancellableFace are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of the local and global unlinkability metrics for biometric template protection systems☆20Jun 27, 2019Updated 6 years ago
- Code for the Secure Triplet Loss approach for biometric template security.☆10Apr 22, 2021Updated 4 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- Official codes of the paper: Deep Center-Based Dual-Constrained Hashing for Discriminative Face Image Retrieval (DCDH)☆29Jun 14, 2024Updated last year
- Multi-index hashing for the resolution of ANN search problem on large datasets☆15Oct 16, 2018Updated 7 years ago
- Vectorized Batch PIR implementation☆12Jun 22, 2023Updated 2 years ago
- 1D-convolutional LSTM based User Identification using EEG biometrics☆12Dec 3, 2019Updated 6 years ago
- Codes of the paper "Adversarial Binary Coding for Efficient Person Re-identification"☆13Apr 24, 2018Updated 7 years ago
- This repository contains the official code for "Flexible Biometrics Recognition: Bridging the Multimodality Gap through Attention, Alignm…☆11Oct 9, 2024Updated last year
- Near-Optimal Oblivious Key-Value Stores☆13Nov 27, 2023Updated 2 years ago
- This code repository collects the source code of the representative deep learning-based MI-EEG models and runs a leaderboard to fairly co…☆17Apr 22, 2025Updated 11 months ago
- Effective solutions to hackerrank.com practice problems in C++, python and SQL☆14Jun 27, 2024Updated last year
- ☆10Dec 12, 2024Updated last year
- ☆12May 6, 2022Updated 3 years ago
- Source code for paper "Similarity Search in High Dimensions via Hashing" on VLDH-1999☆17Jan 1, 2020Updated 6 years ago
- [Paper] Repository for “Realistic Face Reconstruction from Deep Embeddings," published in NeurIPS PriML 2021.☆24Nov 16, 2022Updated 3 years ago
- Biometic Systems project, based on "EEG-based user identification system using 1D-convolutional long short-term memory neural networks"☆11Nov 23, 2021Updated 4 years ago
- Move your Medium posts to a Jekyll blog and keep them in sync in the future.☆12Jan 19, 2025Updated last year
- Deep Siamese convolutional neural net for biometric authentication of palm print images☆10Jul 3, 2024Updated last year
- [TIM 2024] The official implementation for the paper "Affective EEG-based Person Identification with Continual Learning"☆15Aug 12, 2024Updated last year
- the pytorch implementation of SubCenterArcface and sphereface2. And i add the prove of easy_margin part of Arcface in the codes.☆12Dec 1, 2021Updated 4 years ago
- Encryption and decryption examples using private/public key pairs in different languages in a compatible way☆14Mar 7, 2013Updated 13 years ago
- Tasks that allow students to learn the basics of image processing, esp Fingerprint processing.☆10Jan 21, 2025Updated last year
- Source code for the 2019 IEEE CIVEMSA paper "Touchless palmprint and finger texture recognition: A Deep Learning fusion approach"☆18Sep 6, 2021Updated 4 years ago
- ☆17Mar 3, 2024Updated 2 years ago
- Private Set Union☆15Oct 24, 2022Updated 3 years ago
- ☆13Feb 11, 2019Updated 7 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆20Jan 15, 2017Updated 9 years ago
- Conversion of Electrocardiography paper records to binarization and converting to digital form in order to extract features to feed in th…☆10Dec 16, 2020Updated 5 years ago
- Demonstration of FusionNet for touchless palmprint and finger texture recognition. Based on the source code for the 2019 IEEE CIVEMSA pap…☆18Sep 6, 2021Updated 4 years ago
- Code for paper "Towards Privacy-Preserving, Real-Time and Lossless Feature Matching"☆13Aug 2, 2022Updated 3 years ago
- 🎓这是一个自动检索、实时更新arXiv中最新论文的脚本网站,我们主要匹配了注意力机制相关方向的论文,希望对大家科研提供帮助~☆20Updated this week
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆27Mar 17, 2019Updated 7 years ago
- Toolbox for Automatic Secure Two-partY computation☆10May 6, 2016Updated 9 years ago
- Oblivious pseudorandom function over an elliptic curve☆21Oct 26, 2023Updated 2 years ago
- Bridge between TensorFlow and Google's Private Join and Compute library☆16Dec 27, 2022Updated 3 years ago
- fingerprint verification using convolution neural networks☆11Apr 3, 2018Updated 7 years ago
- ☆15Dec 31, 2020Updated 5 years ago
- Here you can find the code for the paper "Training robust neural networks using Lipschitz bounds"☆10Sep 20, 2020Updated 5 years ago