☆16Dec 17, 2018Updated 7 years ago
Alternatives and similar repositories for MCS2018_Solution
Users that are interested in MCS2018_Solution are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Feb 25, 2019Updated 7 years ago
- ☆66Jun 9, 2018Updated 7 years ago
- ☆11Apr 5, 2021Updated 5 years ago
- Interfaces for defining Robust ML models and precisely specifying the threat models under which they claim to be secure.☆62May 30, 2019Updated 6 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆415Jul 6, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- Code to reproduce the attacks and defenses for the entries "JeromeR" in the NIPS 2018 Adversarial Vision Challenge☆19May 1, 2019Updated 6 years ago
- Generating Natural Adversarial Examples, ICLR 2018☆142May 17, 2018Updated 7 years ago
- ICME2022 Special Session “Beyond Accuracy: Responsible, Responsive, and Robust Multimedia Retrieval ”☆12Jun 3, 2024Updated last year
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- Submission to Kaggle NIPS'17 competition on adversarial examples (non-targeted adversarial attack track)☆146Oct 24, 2018Updated 7 years ago
- https://arxiv.org/abs/1904.05049☆13Apr 23, 2019Updated 6 years ago
- This is an official implementation of our CVPR 2020 paper "Non-Local Neural Networks With Grouped Bilinear Attentional Transforms".☆12Jan 30, 2021Updated 5 years ago
- ResearchDoom fork of the Chocolate Doom engine.☆16Oct 20, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Instructions on obtaining stable benchmarks results on modern Linux distro☆19Mar 30, 2026Updated last week
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- ☆11Mar 8, 2021Updated 5 years ago
- Targeted Mismatch Adversarial Attack☆17Aug 12, 2019Updated 6 years ago
- ☆12Jan 7, 2025Updated last year
- Checkout our paper: History Driven Program Repair here☆11Mar 15, 2019Updated 7 years ago
- Refactor utilities for Java code☆13Nov 2, 2017Updated 8 years ago
- Learn from amazing Kagglers on Kaggle☆12Feb 26, 2023Updated 3 years ago
- The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks☆12Jun 4, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The repository for the Code Review Open Platform (CROP)☆13Apr 29, 2018Updated 7 years ago
- GPU implementation of improved dense trajectory☆10Apr 14, 2015Updated 10 years ago
- My implementation of Spectral-Feature-Transformation-ReID, link to the paper: https://arxiv.org/abs/1811.11405☆21Mar 30, 2019Updated 7 years ago
- Yet Another Indent Finder, Almost...☆21Apr 10, 2020Updated 6 years ago
- Code of Non-Local Recurrent Network for Image Restoration (NeurIPS 2018)☆24Apr 15, 2019Updated 6 years ago
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆237Mar 27, 2018Updated 8 years ago
- A Python-based toolkit for rendering high-quality images and videos of 3D objects using Blender, specifically designed for research proje…☆35May 10, 2025Updated 11 months ago
- pytorch version of code completion with neural attention and pointer networks☆12Jan 17, 2020Updated 6 years ago
- Probabilistic Computer Network Analysis☆20Dec 8, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Implementation of Spectral Leakage and Rethinking the Kernel Size in CNNs in Pytorch☆14Feb 3, 2021Updated 5 years ago
- Robotics Learning Note☆11Jun 22, 2018Updated 7 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Feb 12, 2020Updated 6 years ago
- LD_PRELOAD-able library which runs all spawned processes under Valgrind.☆15Jul 1, 2022Updated 3 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆74Nov 3, 2018Updated 7 years ago
- Bug Report driven Program Repair☆17Feb 15, 2020Updated 6 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆14Feb 16, 2022Updated 4 years ago