☆62Dec 26, 2024Updated last year
Alternatives and similar repositories for Opensource
Users that are interested in Opensource are comparing it to the libraries listed below
Sorting:
- FL-EASGD: Federated Learning Privacy Security Method Based on Homomorphic Encryption☆73Dec 25, 2024Updated last year
- ☆71Dec 31, 2024Updated last year
- Implementation of Matrix Operations over Binary Fields and White-box SM4☆57Dec 31, 2024Updated last year
- ☆54Dec 31, 2024Updated last year
- ☆254Mar 31, 2025Updated 11 months ago
- GTAR l2l generator unlearning project☆17May 6, 2024Updated last year
- Bilibili(B站,Bili)直播独轮车脚本(Bilibili-Live-Spamer)☆37Updated this week
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- CUMT信息安全专业毕业设计☆37Oct 7, 2023Updated 2 years ago
- [IEEE TIP] Fine-grained Recognition with Learnable Semantic Data Augmentation☆31Dec 23, 2023Updated 2 years ago
- ☆43Nov 27, 2025Updated 3 months ago
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- Adversarial training with PGD adversarial examples☆35Sep 18, 2019Updated 6 years ago
- 毕业设计--基于区块链的医疗记录存储系统研究与开发☆73Jun 19, 2020Updated 5 years ago
- MTL-TabNet: Multi-task Learning based Model for Image-based Table Recognition☆104May 30, 2024Updated last year
- [NeurIPS 2023] Dynamic Prompt Learning: Addressing Cross-Attention Leakage for Text-Based Image Editing☆111May 15, 2024Updated last year
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- DBA: Distributed Backdoor Attacks against Federated Learning (ICLR 2020)☆203Aug 5, 2021Updated 4 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated 2 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 8 years ago
- 文档方向分类☆222Feb 3, 2026Updated last month
- Breaching privacy in federated learning scenarios for vision and text☆316Jan 24, 2026Updated last month
- Analysis of Chinese and English layouts 中英文版面分析☆269Mar 6, 2026Updated 2 weeks ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Dec 17, 2020Updated 5 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- 基于序列表格识别算法推理库,集成PP-Structure和modelscope等表格识别算法。☆415Sep 4, 2025Updated 6 months ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆253Oct 30, 2019Updated 6 years ago
- Simple pytorch implementation of FGSM and I-FGSM☆293Mar 21, 2018Updated 8 years ago
- A Lighting Pytorch Framework for Recommendation Models (PyTorch推荐算法框架), Easy-to-use and Easy-to-extend. https://datawhalechina.github.io/…☆951Updated this week
- Provable adversarial robustness at ImageNet scale☆407May 20, 2019Updated 6 years ago
- Implement Statistical Learning Methods, Li Hang the hard way. 李航《统计学习方法》一书的硬核 Python 实现☆1,181Jun 4, 2022Updated 3 years ago
- Fidelius - YeeZ Privacy Computing 基于可信执行环境的熠智隐私计算中间件☆1,054Updated this week
- Parsing-free RAG supported by VLMs☆935Dec 7, 2025Updated 3 months ago
- Paint by Example: Exemplar-based Image Editing with Diffusion Models☆1,251Nov 28, 2023Updated 2 years ago
- PyTorch implementation of Barlow Twins.☆1,002Mar 3, 2022Updated 4 years ago
- ❤️这是一条汇总网上许多资料,而不是资料的纯粹堆砌,让人眼花缭乱的复制粘贴,这不是帮你在总结所有的知识点,而是根据实际的计算机系课程来安排学习路线,并且配合上面向就业的学习,与完全跟着学校课程相比,做到了不和工业界面试不脱节,非常实际、非常认真、非常掉头发,真心求个视频三连…☆1,286Dec 20, 2022Updated 3 years ago
- python3写的综合扫描工具,主要用来存活验证,敏感文件探测(目录扫描/js泄露接口/html注释泄露),WAF/CDN识别,端口扫描,指纹/服务识别,操作系统识别,POC扫描,SQL注入,绕过CDN,查询旁站等功能,主要用来甲方自测或乙方授权测试,请勿用来搞破坏。☆1,758Jan 2, 2020Updated 6 years ago
- 我的学习资料,包括书籍、网址等☆2,043May 10, 2014Updated 11 years ago
- A Toolbox for Adversarial Robustness Research☆1,365Sep 14, 2023Updated 2 years ago