Pinned Repositories
adv-attacks-defense-paper-list
Personal Adversarial Attacks and Defense Paper Collections (updating)
Apriori-FPGrowth
C++ implementation of Apriori & FP-Growth Algorithm
EightPuzzle
A*, Greedy and IDS implements of eight puzzle problem
Toward2017
Unofficial code for Protocol 2 in "Toward practical privacy-preserving frequent itemset mining on encrypted cloud data", IEEE Transactions on Cloud Computing, 2017
yi
Unofficial code of Privacy-preserving association rule mining in cloud computing (in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security)
build_tools
Used to build ONLYOFFICE DocumentServer-related products
WuHua
Brand new project from wuhua group.
Airscope's Repositories
Airscope/adv-attacks-defense-paper-list
Personal Adversarial Attacks and Defense Paper Collections (updating)
Airscope/Apriori-FPGrowth
C++ implementation of Apriori & FP-Growth Algorithm
Airscope/EightPuzzle
A*, Greedy and IDS implements of eight puzzle problem
Airscope/Toward2017
Unofficial code for Protocol 2 in "Toward practical privacy-preserving frequent itemset mining on encrypted cloud data", IEEE Transactions on Cloud Computing, 2017
Airscope/yi
Unofficial code of Privacy-preserving association rule mining in cloud computing (in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security)