Skip to content
View Rafiqcompton's full-sized avatar
🐙
smh
🐙
smh

Block or report Rafiqcompton

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Rafiqcompton/README.md

Hi there 👋

image

Welcome to my GitHub portfolio! Data engineer by day, blockchain enthusiast by night. Clouds are my playground, and malware is my puzzle. Analyzing data with a touch of blockchain sorcery, while dancing with the clouds and taming the malware beasts. Join me on this wild journey through the realms of data, blockchain, cloud, and the dark side of code. Let's decode the mysteries and create a brighter, safer digital future. #DataWizard #BlockchainLover #CloudDancer #MalDevTamer

Pinned Loading

  1. Blockchain-Based-Certificate-Verification-System Blockchain-Based-Certificate-Verification-System Public

    The Blockchain-Based Certificate Verification System is a decentralized application (DApp) that allows users to verify the authenticity and integrity of digital certificates using blockchain techno…

    1

  2. Anomaly-Detection-Algorithm Anomaly-Detection-Algorithm Public

    This algorithm monitors network traffic and user behavior to identify unusual patterns that deviate from the norm.

    1

  3. Bias-Identification-and-Correction-Algorithm Bias-Identification-and-Correction-Algorithm Public

    This algorithm is used to identify and correct biases in data using statistical tests and adversarial training. It can be adapted to specific types of data, such as image data or text data, and can…

    1

  4. Data-Leakage-Prevention-Algorithm Data-Leakage-Prevention-Algorithm Public

    This algorithm monitors data transfers within and outside the network to prevent sensitive information from being leaked.

    1

  5. Privacy-Preserving-Data-Sharing-Algorithm Privacy-Preserving-Data-Sharing-Algorithm Public

    This algorithm would allow for the sharing of useful data between entities while preserving the privacy of individual data points. It could be particularly useful in healthcare or other sensitive s…

    1

  6. CerberusFL CerberusFL Public

    CerberusFL(Federated Learning )is a blockchain-based algorithm that enables secure and decentralized federated learning. Federated learning is a machine learning technique that allows multiple part…

    1