BlackIQ / the-great-gatsby
The Great Gatsby open-source novel.
☆15Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for the-great-gatsby
- Blood-cancer-detection with PyTorch☆15Updated 2 years ago
- The goal of this project is to develop a deep learning model for the classification of chest cancer using PyTorch and EfficientNet☆18Updated last year
- Demo of Digital Watermarking in images☆10Updated 6 years ago
- 本项目主要记录自己的学习过程,当前施工范围是数学(数学一)和计算机(408)相关知识,用于备考2023年研究生。☆9Updated 2 years ago
- Airbyte is an open-source EL(T) platform that helps you replicate your data in your warehouses, lakes and databases.☆7Updated 2 years ago
- Framework for stress detection from StudentLife DataSet☆7Updated 6 years ago
- Official implementation of Segmentation and Complete (SAC) defense.☆20Updated 11 months ago
- A Robust Blind Watermarking Using Convolutional Neural Network☆23Updated 5 years ago
- Adversarial attacks including DeepFool and C&W☆13Updated 5 years ago
- Transformer Model to detect deepfakes from popular datasets. Predictions made on embeddings (features) generated by a different ViT model…☆12Updated 11 months ago
- The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0☆28Updated last year
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Updated 5 years ago
- c++小项目之职工工资信息管理系统☆16Updated 4 years ago
- jamiechoi1995 / Blind-image-watermarking-technique-based-on-differential-embedding-in-DWT-and-DCT-domainsunofficial implementation☆9Updated 5 years ago
- List for learning image steganography☆18Updated 5 months ago
- Implementation of algorithms DCT, DWT watermarking.☆33Updated 10 months ago
- Did you ever wanted a C# Redis client that doen't sucks? ever heard of SOLID or clean code? If the answer is yes. don't worry, we got you…☆11Updated 4 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆9Updated 6 years ago
- ☆19Updated 2 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆23Updated 2 years ago
- 华中科技大学计算机视觉实验,基于卷积神经网络的手写数字识别,和快速梯度下降法(FGSM)的攻击以及基于对抗训练的防御。☆12Updated last year
- KNN Defense Against Clean Label Poisoning Attacks☆10Updated 3 years ago
- Code for our research paper VStegNET☆12Updated last year
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆42Updated 5 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆121Updated last year
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆19Updated last year
- Generate adversarial patches against YOLOv5 🚀☆42Updated last month
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆11Updated last year
- Adversarial Attack on Visual Object Tracking☆14Updated 3 years ago
- Implementations and demo of a regular Backdoor and a Latent backdoor attack on Deep Neural Networks.☆18Updated 2 years ago