☆11Jun 23, 2017Updated 8 years ago
Alternatives and similar repositories for softwareEngineeringReview
Users that are interested in softwareEngineeringReview are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- CVAE based School Idol image generation. Published in proc. of SSCC 2nd, 2017.☆12Nov 16, 2017Updated 8 years ago
- ICSE2021 Submission☆13Aug 28, 2022Updated 3 years ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- An on-demand application to allow ride sharing between users across longer distances than is feasible for common ride-sharing application…☆12May 29, 2017Updated 8 years ago
- ☆12Jun 18, 2020Updated 5 years ago
- ☆11Mar 24, 2023Updated 3 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Python implementation for the project titled "Optimization problems in vehicle route network design" developed at IIIT Delhi as part of m…☆13Dec 8, 2022Updated 3 years ago
- [NeurIPS 2022] "Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks"☆13Nov 11, 2022Updated 3 years ago
- Code for paper by Bamler & Mandt, "Extreme Classification via Adversarial Softmax Approximation" (ICLR 2020)☆14Apr 8, 2020Updated 6 years ago
- Median cut color quantization☆10Oct 3, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆12Mar 15, 2019Updated 7 years ago
- 基于OverFeat的病斑检测系统☆11Mar 7, 2017Updated 9 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- ☆12Sep 14, 2021Updated 4 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- ArcGIS tool to convert any features (e.g., lines) into an edge list☆12Jul 17, 2020Updated 5 years ago
- Protocols for Secure Genomic Computation☆12Aug 28, 2017Updated 8 years ago
- ☆20Feb 13, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"☆10Oct 16, 2025Updated 5 months ago
- ☆12Apr 27, 2022Updated 3 years ago
- A TensorFlow implementation of VGG networks for image classification☆12Jan 10, 2019Updated 7 years ago
- ☆13Nov 23, 2019Updated 6 years ago
- An Algorithm for Ridesharing☆10May 8, 2018Updated 7 years ago
- Adversarial Robustness on In- and Out-Distribution Improves Explainability☆12Feb 10, 2022Updated 4 years ago
- ☆13Dec 21, 2018Updated 7 years ago
- ☆13Jul 25, 2024Updated last year
- ☆11Jan 2, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆22Jul 28, 2020Updated 5 years ago
- ☆22Jul 19, 2022Updated 3 years ago
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆17Mar 29, 2023Updated 3 years ago
- [TIFS'22]Smart App Attack: Hacking Deep Learning Models in Android Apps☆16Jun 8, 2022Updated 3 years ago
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- Color image quantization☆20May 11, 2019Updated 6 years ago
- Neural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.☆16Jan 13, 2026Updated 2 months ago