0three / CAAD-2018-KunlinView external linksLinks
This project proposed a method to defense against adversarial attack. By combining the proposed preprocessing method with an adversarially trained model, it ranked No.5 in the CAAD2018 defense sub-competition(https://en.caad.geekpwn.org/competition/list.html?menuId=10)
☆10Oct 4, 2018Updated 7 years ago
Alternatives and similar repositories for CAAD-2018-Kunlin
Users that are interested in CAAD-2018-Kunlin are comparing it to the libraries listed below
Sorting:
- For Competition on Adversarial Attacks and Defenses 2018☆40Jan 4, 2019Updated 7 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Code to the paper: The Geometry of Refusal in Large Language Models: Concept Cones and Representational Independence☆23Jul 31, 2025Updated 6 months ago
- ☆16Dec 4, 2019Updated 6 years ago
- CAAD 2018 winning submissions☆35Feb 10, 2019Updated 7 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Dec 26, 2019Updated 6 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 7 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆35Apr 18, 2023Updated 2 years ago
- 《机器学习实战》样例代码☆13Dec 30, 2018Updated 7 years ago
- DJI Assistant 2 web socket server exploitation tools☆37Mar 7, 2018Updated 7 years ago
- Software project☆12Jun 21, 2022Updated 3 years ago
- ☆14Jul 5, 2022Updated 3 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆39Jan 28, 2019Updated 7 years ago
- A Python implementation of the Viterbi Algorithm with Bigram Hidden Markov Model(HMM) taggers for predicting Parts of Speech(POS) tags. -…☆12Feb 9, 2016Updated 10 years ago
- High-performance capability engine for AI agents. Cryptographically attenuated warrants, task-scoped authority, Rust core.☆22Feb 7, 2026Updated last week
- it's quite self explanatory: a crawler with sqlmap☆13Jul 13, 2017Updated 8 years ago
- yet another DL framework☆11Oct 28, 2018Updated 7 years ago
- Papers of deep learning for trading☆12Jun 4, 2020Updated 5 years ago
- 这是一个面向币圈新手的入门速通指南集合,包括最全面的币圈区块链资源集合,包含各类工具导航,快速了解币圈常用术语和行话,详细的防骗指南,助你规避各类风险☆19Nov 6, 2025Updated 3 months ago
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆39Updated this week
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- The Decompressoin tool for Vxworks MINIFS☆13May 18, 2021Updated 4 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- knxnet is a python library to create and decode KNXnet/IP datagram for Tunnelling.☆13Apr 7, 2017Updated 8 years ago
- Tools for recording, processing and displaying CAN BUS data, specifically for the Tesla Model S☆11Oct 19, 2020Updated 5 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Code for ACL 2023 paper "A Close Look into the Calibration of Pre-trained Language Models"☆11May 9, 2023Updated 2 years ago
- TensorFlow: learn and practice☆11Aug 30, 2018Updated 7 years ago
- Implementation of Hashtag Recommendation for Photo Sharing Services☆12Nov 23, 2018Updated 7 years ago
- ☆13Jan 14, 2026Updated last month
- Translate PDF to ePub by Gemini☆20Jun 18, 2025Updated 7 months ago
- a better basefinder☆12Aug 25, 2021Updated 4 years ago
- peda like debugger script for windbg/windbgx and mingw-gdb☆11Dec 31, 2021Updated 4 years ago
- Complete educational guide with 100+ working code examples for building production-ready AI agents using the OpenAI Agents SDK. Learn t…☆14Jan 10, 2026Updated last month
- 膨胀卷积,Multi Scale Context Aggregation by Dilated Convolutions的实现☆12Dec 24, 2017Updated 8 years ago
- A better working example of SIFRank and SIFRank+ models for keyword extraction. Easy to setup using docker-compose.☆11Oct 29, 2024Updated last year
- 基于k8s和django的快速生成容器的平台,支持webssh与webvnc连接,需要安装guacamole服务,Cloud platform based on kubernetes and django, supports webssh and webvnc☆12Aug 28, 2024Updated last year
- DroidForce Project Repository. See our ARES'2014 paper for the details on DroidForce.☆19Mar 9, 2016Updated 9 years ago