Abhishekmamidi123 / Information-RetrievalLinks
Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.
☆11Updated 7 years ago
Alternatives and similar repositories for Information-Retrieval
Users that are interested in Information-Retrieval are comparing it to the libraries listed below
Sorting:
- Pytorch implementation of Backdoor Attack against Speaker Verification☆26Updated 2 years ago
- IStego100K: Large-scale Image Steganalysis Dataset☆67Updated 5 years ago
- Robust Audio Adversarial Example for a Physical Attack☆63Updated 5 years ago
- Emotion detection from text using PyTorch and Federated Learning☆34Updated 6 years ago
- ☆36Updated 6 years ago
- Code for the paper 'Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms', ECIR'18☆47Updated 5 years ago
- A chatbot implemented using RNN and GloVe embeddings whch answers your query crazily☆12Updated 5 years ago
- ☆10Updated 4 years ago
- Fooling neural based speech recognition systems.☆14Updated 8 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆71Updated 5 years ago
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆26Updated 5 years ago
- Privacy Preserving Machine Learning (Manning Early Access Program)☆33Updated 2 years ago
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Updated 4 years ago
- Contains materials for workshops pertaining to adversarial robustness in deep learning.☆86Updated 4 years ago
- Using federated learning and CNNs to analyze X-ray images of Lungs and determining whether pneumonia is present.☆34Updated 6 years ago
- This is the codebase for defense framework described in USENIX '21 paper "WaveGuard: Understanding and Mitigating Audio Adversarial Examp…☆17Updated 3 years ago
- This repository shows how to implement a basic model for multimodal entailment.☆10Updated 4 years ago
- This is a intuitive explanation of Representation Learning with Contrastive Predictive Coding using code provided by jefflai108 that use…☆10Updated 4 years ago
- ☆23Updated 5 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆45Updated 2 years ago
- ☆33Updated 2 years ago
- An end-to-end Python pipeline for performing sentiment analysis on audio files of call-center conversations.☆36Updated 7 years ago
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆21Updated 4 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 4 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆79Updated 2 years ago
- Causal Reasoning for Membership Inference Attacks☆11Updated 2 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆143Updated 4 years ago
- Bad Characters: Imperceptible NLP Attacks☆35Updated last year
- ☆64Updated 3 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆104Updated 2 years ago