☆50Dec 6, 2024Updated last year
Alternatives and similar repositories for AVA
Users that are interested in AVA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆46Nov 21, 2024Updated last year
- ☆43Nov 27, 2024Updated last year
- ☆50Jun 1, 2024Updated last year
- This repository provide C version and Rust bindings for operators in halo2☆44Dec 5, 2024Updated last year
- ☆31Oct 22, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆160Aug 12, 2025Updated 8 months ago
- ☆11Oct 30, 2024Updated last year
- MSM-优化☆16Apr 3, 2025Updated last year
- [NeurIPS 2024 D&B] DetectRL: Benchmarking LLM-Generated Text Detection in Real-World Scenarios☆15Nov 19, 2024Updated last year
- ☆12Sep 8, 2023Updated 2 years ago
- A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).☆14Nov 18, 2015Updated 10 years ago
- using rulsif for abrupt-change detection focusing on Environment, Usage, References, Introduction, Rulsif abrupt change detection.☆10Sep 3, 2025Updated 7 months ago
- MultiVariate Convolutional Neural Network☆10May 10, 2018Updated 7 years ago
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆17Feb 12, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An automatic MLLM hallucination detection framework☆19Sep 26, 2023Updated 2 years ago
- A War Beyond Deepfake: Benchmarking Facial Counterfeits and Countermeasures☆24Mar 2, 2026Updated last month
- This is an implementation of direct density ratio estimation by unconstrained Least-Squares Importance Fitting (uLSIF) with python.☆15May 31, 2024Updated last year
- 符合华南师范大学硕士/博士学位论文格式要求的LaTeX模板。☆14Jan 22, 2015Updated 11 years ago
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Oct 12, 2024Updated last year
- Code and data for Koo et al's ACL 2024 paper "Benchmarking Cognitive Biases in Large Language Models as Evaluators"☆22Feb 16, 2024Updated 2 years ago
- unformal implementation of advdiffuser☆17Feb 4, 2024Updated 2 years ago
- ☆21Jul 1, 2021Updated 4 years ago
- ☆12May 6, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Coded Merkle Tree☆25Aug 6, 2019Updated 6 years ago
- springboot auto xss☆11May 23, 2018Updated 7 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆13Sep 6, 2023Updated 2 years ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Mar 26, 2026Updated last month
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- ☆12Dec 23, 2019Updated 6 years ago
- ☆11Jul 31, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Feb 26, 2025Updated last year
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- http://cvlab.cse.msu.edu/project-pifa.html☆28Jul 9, 2019Updated 6 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- ☆11Dec 9, 2018Updated 7 years ago
- ☆12Jul 30, 2019Updated 6 years ago