DevPranjal / D2L-Exercises
Solutions to the exercises in Dive into Deep Learning, in PyTorch
☆10Updated 2 years ago
Alternatives and similar repositories for D2L-Exercises:
Users that are interested in D2L-Exercises are comparing it to the libraries listed below
- Reproduction of the CVPR'21 paper Distilling Knowledge via Knowledge Review for the ML Reproducibility Challenge 2021☆10Updated 2 years ago
- Our submission for the Microsoft Membership Inference Competion at SaTML 2023☆15Updated last year
- Following research on S4 in jax☆14Updated 2 years ago
- Winning solution of work done on model extraction over Vision Transformers such as Video-Swin-T and MoViNeT-A2-Base on Video Action-Recog…☆18Updated 2 years ago
- ☆33Updated last year
- This is a question bank for practicing Machine Learning for Interviews.☆33Updated 2 years ago
- Wheat detection using Faster RCNN☆15Updated last year
- ☆18Updated last year
- Web-based Tool for visualisation and generation of adversarial examples by attacking ImageNet Models like VGG, AlexNet, ResNet etc.☆51Updated last year
- Starter kit and data loading code for the Trojan Detection Challenge NeurIPS 2022 competition☆33Updated last year
- Code for the paper "A Light Recipe to Train Robust Vision Transformers" [SaTML 2023]☆52Updated last year
- ☆33Updated last year
- This repository holds code and other relevant files for the NeurIPS 2022 tutorial: Foundational Robustness of Foundation Models.☆70Updated 2 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30Updated 2 years ago
- ☆43Updated 5 months ago
- Library containing PyTorch implementations of various adversarial attacks and resources☆150Updated last month
- Privacy backdoors☆51Updated 9 months ago
- Pytorch ImageNet1k Loader with Bounding Boxes.☆12Updated 3 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 2 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆23Updated 3 years ago
- The official code for the publication: "The Close Relationship Between Contrastive Learning and Meta-Learning".☆19Updated 2 years ago
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆21Updated 2 years ago
- ☆16Updated last year
- ☆106Updated last month
- Implementation of the SuRP algorithm by the authors of the AISTATS 2022 paper "An Information-Theoretic Justification for Model Pruning".…☆13Updated 2 years ago
- [AAAI, ICLR TP] Fast Machine Unlearning Without Retraining Through Selective Synaptic Dampening☆45Updated 4 months ago
- Causal Reasoning for Membership Inference Attacks☆10Updated 2 years ago
- ☆39Updated last year
- ☆32Updated last year
- ☆18Updated last year