yuanmu97 / secure-transformer-inferenceLinks
Secure Transformer Inference is a protocol for serving Transformer-based models securely.
☆95Updated last year
Alternatives and similar repositories for secure-transformer-inference
Users that are interested in secure-transformer-inference are comparing it to the libraries listed below
Sorting:
- 🔥[MobiCom'25 Poster] AFL-Lib: An Asynchronous Federated Learning Library and Benchmark☆22Updated 2 months ago
- ☆16Updated 11 months ago
- ☆80Updated 3 months ago
- ☆76Updated 9 months ago
- [ICML 2025] Official implementation of paper "Token Cleaning: Fine-Grained Data Selection for LLM Supervised Fine-Tuning"☆48Updated 3 months ago
- 通过撤销数据对联邦学习模型的训练更新,解决了联邦学习中的数据隐私安全问题。☆25Updated last month
- A collection of papers related to knowledge fusion☆59Updated 11 months ago
- ☆36Updated last year
- [ICLR 2025] Official implementation of paper "Improving Data Efficiency via Curating LLM-Driven Rating Systems"☆96Updated 5 months ago
- Multi-Attentional Deepfake Detection☆22Updated 10 months ago
- A curated list of resources around BitVM☆27Updated last year
- ☆96Updated 4 years ago
- ☆20Updated last year
- StrategyLLM: Large Language Models as Strategy Generators, Executors, Optimizers, and Evaluators for Problem Solving☆21Updated 9 months ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆32Updated last year
- GLT has presented the first attempt to accelerate GNN inference. Though promising, GLT encounters robustness and generalization issues wh…☆28Updated last year
- The official code repo for "Safe Delta: Consistently Preserving Safety when Fine-Tuning LLMs on Diverse Datasets" in ICML 2025.☆52Updated 2 months ago
- GAL-DAWN: An Novel High performance computing Library of Graph Algorithms based on DAWN, CUDA/C++☆86Updated 6 months ago
- ☆29Updated 6 months ago
- Official Implementation of "Accel-GNN: High-Performance GPU Accelerator Design for Graph Neural Networks"☆51Updated 6 months ago
- use sklearn to detect two types of network attacks☆34Updated 6 years ago
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆10Updated 4 months ago
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆24Updated 4 years ago
- A comprehensive collection of resources focused on addressing and understanding hallucination phenomena in MLLMs.☆34Updated last year
- ACL 2024☆34Updated 2 months ago
- 2048 in c language☆34Updated this week
- 2d game, the game prototype is Magic Tower☆27Updated 9 months ago
- alsap_frontend☆63Updated 7 months ago
- [NeurIPS-2022] Efficient gRaph sImilarity Computation with Alignment Regularization☆30Updated 2 years ago
- A framework for implementing federated learning☆31Updated 4 years ago