☆50Dec 6, 2024Updated last year
Alternatives and similar repositories for AVA
Users that are interested in AVA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Oct 30, 2024Updated last year
- [NeurIPS 2024 D&B] DetectRL: Benchmarking LLM-Generated Text Detection in Real-World Scenarios☆14Nov 19, 2024Updated last year
- ☆12Sep 8, 2023Updated 2 years ago
- A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).☆14Nov 18, 2015Updated 10 years ago
- using rulsif for abrupt-change detection focusing on Environment, Usage, References, Introduction, Rulsif abrupt change detection.☆10Sep 3, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- MultiVariate Convolutional Neural Network☆10May 10, 2018Updated 7 years ago
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆17Feb 12, 2025Updated last year
- An automatic MLLM hallucination detection framework☆19Sep 26, 2023Updated 2 years ago
- A War Beyond Deepfake: Benchmarking Facial Counterfeits and Countermeasures☆24Mar 2, 2026Updated last month
- This is an implementation of direct density ratio estimation by unconstrained Least-Squares Importance Fitting (uLSIF) with python.☆15May 31, 2024Updated last year
- 符合华南师范大学硕士/博士学位论文格式要求的LaTeX模板。☆14Jan 22, 2015Updated 11 years ago
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Oct 12, 2024Updated last year
- Code and data for Koo et al's ACL 2024 paper "Benchmarking Cognitive Biases in Large Language Models as Evaluators"☆22Feb 16, 2024Updated 2 years ago
- unformal implementation of advdiffuser☆17Feb 4, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆21Jul 1, 2021Updated 4 years ago
- ☆12May 6, 2022Updated 3 years ago
- The C implementation of Hash_DRBG in NIST SP 800-90A Rev.1 is provided. Header files and library files of OpenSSL 1.1.1 or higher version…☆20May 16, 2023Updated 2 years ago
- Coded Merkle Tree☆25Aug 6, 2019Updated 6 years ago
- springboot auto xss☆11May 23, 2018Updated 7 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Mar 26, 2026Updated last week
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- ☆12Dec 23, 2019Updated 6 years ago
- ☆11Jul 31, 2022Updated 3 years ago
- ☆14Feb 26, 2025Updated last year
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- ☆11Dec 9, 2018Updated 7 years ago
- ☆12Jul 30, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Oct 31, 2022Updated 3 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- Official code for Forensics Adapter (CVPR'25).☆93Mar 1, 2026Updated last month
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated 3 months ago
- ☆14Oct 21, 2021Updated 4 years ago
- Convexified Convolutional Neural Networks☆15Dec 13, 2016Updated 9 years ago