DBLP Management System / DBLP 科学文献管理系统
☆16Feb 25, 2018Updated 8 years ago
Alternatives and similar repositories for DBLPQuickBrowser
Users that are interested in DBLPQuickBrowser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ICIP 2021] PyTorch code for "The Mind's Eye: Visualizing Class-Agnostic Features of CNNs" for generation of kernel features.☆12Sep 12, 2021Updated 4 years ago
- [CVPR2025] The implementation of Adapter Merging with Centroid Prototype Mapping for Scalable Class-Incremental Learning☆20Dec 6, 2025Updated 5 months ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- A caffe version implementation of a hash network(DNNH/NINH) for similarity-based visual research based on paper: Simultaneous feature lea…☆26Jan 19, 2021Updated 5 years ago
- 图像多标签分类标注工具☆15Feb 5, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The official implementation of NeurIPS 2021 paper: Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks☆17Jul 4, 2023Updated 2 years ago
- Code for Arxiv 2018 Paper "HAHE: Hierarchical Attentive Heterogeneous Information Network Embedding"☆32May 19, 2019Updated 6 years ago
- ☆29May 8, 2025Updated last year
- ☆25May 7, 2022Updated 4 years ago
- Improving Style Transfer With Calibrated Metrics☆16Mar 24, 2020Updated 6 years ago
- ☆34May 24, 2024Updated last year
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Mar 16, 2022Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆29Jun 27, 2022Updated 3 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Jun 7, 2021Updated 4 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 3 years ago
- Code for AAAI 2021 paper ``MetaAttack"☆26Jun 10, 2021Updated 4 years ago
- learning to protect communications with adversarial neural cryptography☆20Aug 15, 2018Updated 7 years ago
- Pytorch implementation of our paper accepted by TPAMI 2023 — Lottery Jackpots Exist in Pre-trained Models☆35Jun 19, 2023Updated 2 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆32Dec 8, 2022Updated 3 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆32Jun 9, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆28Dec 31, 2020Updated 5 years ago
- The Pitfalls of Simplicity Bias in Neural Networks [NeurIPS 2020] (http://arxiv.org/abs/2006.07710v2)☆42Jan 21, 2024Updated 2 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆64Jan 14, 2020Updated 6 years ago
- Task-agnostic universal black-box attacks on computer vision neural network via procedural noise (CCS'19)☆55Dec 21, 2020Updated 5 years ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆56Jan 18, 2022Updated 4 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Mar 25, 2023Updated 3 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆49May 9, 2025Updated last year
- PatchAttack (ECCV 2020)☆65May 22, 2020Updated 5 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆98Dec 8, 2022Updated 3 years ago
- NDL古典籍OCRのアプリケーション(ソースコードを含む)☆97Oct 14, 2025Updated 6 months ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆80Jul 25, 2024Updated last year
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- Dynamic Network Embedding by Modeling Triadic Closure Process☆141Jun 4, 2019Updated 6 years ago
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆76Dec 5, 2022Updated 3 years ago
- Graph Representation Learning via Graphical Mutual Information Maximization☆118May 5, 2020Updated 6 years ago