AntonFriberg / pytorch-cinic-10View external linksLinks
Pytorch deep learning object detection using CINIC-10 dataset.
☆22Feb 26, 2020Updated 5 years ago
Alternatives and similar repositories for pytorch-cinic-10
Users that are interested in pytorch-cinic-10 are comparing it to the libraries listed below
Sorting:
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 5 years ago
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- ☆18Oct 7, 2022Updated 3 years ago
- ☆19Jun 27, 2021Updated 4 years ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆20Aug 10, 2024Updated last year
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- Deploy Swin Transformer using TorchServe☆27Jul 13, 2021Updated 4 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- ☆28Aug 21, 2023Updated 2 years ago
- ☆24Apr 14, 2019Updated 6 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Updated this week
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- ☆30Feb 1, 2019Updated 7 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Jul 15, 2021Updated 4 years ago
- Finetuning & extending DiffusionDet to video & pedestrian multi-object-tracking☆13Apr 12, 2023Updated 2 years ago
- 新词发现/新词挖掘/自由度/凝固度/python3☆10May 28, 2019Updated 6 years ago
- Style Transfer by Rigid Alignment in Neural Net Feature Space☆11Jan 23, 2021Updated 5 years ago
- ☆12May 6, 2022Updated 3 years ago
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- 豆瓣电影评论可视化☆10May 19, 2016Updated 9 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 3 years ago
- I have created a dataset of Image-Text-Pairs by using the cosine similarity of the CLIP embeddings of the image & it's caption derrived f…☆15Apr 22, 2021Updated 4 years ago
- ☆11Oct 30, 2024Updated last year
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- Detects scene change or cuts in a video file☆11Oct 23, 2017Updated 8 years ago
- ☆11Dec 9, 2018Updated 7 years ago
- ☆12Aug 30, 2022Updated 3 years ago
- ☆12Dec 22, 2025Updated last month
- A simple implementation of BadNets on MNIST☆33Jul 29, 2019Updated 6 years ago
- WoBERT_pytorch☆40Apr 18, 2021Updated 4 years ago
- Practical One-Shot Federated Learning for Cross-Silo Setting☆41May 21, 2021Updated 4 years ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago