Popular repositories Loading
-
-
adv-attacks-defense-paper-list
adv-attacks-defense-paper-list PublicPersonal Adversarial Attacks and Defense Paper Collections (updating)
-
-
Toward2017
Toward2017 PublicUnofficial code for Protocol 2 in "Toward practical privacy-preserving frequent itemset mining on encrypted cloud data", IEEE Transactions on Cloud Computing, 2017
Go
-
yi
yi PublicUnofficial code of Privacy-preserving association rule mining in cloud computing (in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security)
Python
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.