Ke Zhong's starred repositories
Shadowgraphy
Pseudonymization with Cryptography
leetcode-master
《代码随想录》LeetCode 刷题攻略:200道经典题目刷题顺序,共60w字的详细图解,视频难点剖析,50余张思维导图,支持C++,Java,Python,Go,JavaScript等多语言版本,从此算法学习不再迷茫!🔥🔥 来看看,你会发现相见恨晚!🚀
AML-Data
The data represents financial transactions -- bank transfers, purchases, credit card transactions, checks, etc. Most of the transactions are legitimate. A few represent money laundering. The data is in CSV format. The data is generated using a multi-agent virtual world model. All of the agents in the virtual world have actions governed by statistical distributions. Thus the model and data are NOT based on obfuscating or anonymizing real individuals. Everything is synthetic. More specifically the underlying model uses a virtual world of banks, individuals, and companies -- with individuals and companies buying items, and doing bank transfers to make payments, get supplies, pay salaries, etc. The underlying model has good and bad actors, with bad actors doing things like smuggling, extortion, illegal gambling, etc. The bad actors sometimes attempt to launder ill-gotten funds resulting in money-laundering transactions. NOTE : Although this repository is under the Apache-2.0 license, the actual data is released under the CDLA-Sharing-1.0 license.
rtb-papers
A collection of research and survey papers of real-time bidding (RTB) based display advertising techniques.
afl-training
Exercises to learn how to fuzz with American Fuzzy Lop
cmtp-responder
MTP responder written in C, with permissive license and minimal dependencies
AutoElectsys
上海交通大学 1999-2018 版本科教学信息服务网自动选课工具(对 2019 新版网站不可用)
awesome-cve-poc
✍️ A curated list of CVE PoCs.