Project aimed to detect possible fishing activity in the ocean from vessel's trajectories.
☆14Jun 25, 2017Updated 8 years ago
Alternatives and similar repositories for Detecting-fishing-activity
Users that are interested in Detecting-fishing-activity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bayesian Hierarchical clustering in python☆17Sep 26, 2017Updated 8 years ago
- Code for our paper 'Learning from Multiple Annotator Noisy Labels via Sample-wise Label Fusion' published on ECCV 2022☆11Jul 27, 2022Updated 3 years ago
- Will be uploading codes as project progresses☆11Dec 9, 2022Updated 3 years ago
- Javascript library fuzzer. Tries to detect functions which may lead to XSS vulnerabilities if untrusted data is passed to said functions.☆16Oct 6, 2020Updated 5 years ago
- ☆19Jun 26, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- Formed trajectories of sets of points.Experimented on finding similarities between trajectories based on DTW (Dynamic Time Warping) and L…☆65Feb 1, 2024Updated 2 years ago
- ☆20May 23, 2025Updated 10 months ago
- ☆31Jul 20, 2020Updated 5 years ago
- Source code for the "Collision Risk Assessment and Forecasting on Maritime Data" paper☆13Oct 8, 2023Updated 2 years ago
- [Re] Can gradient clipping mitigate label noise? (ML Reproducibility Challenge 2020)☆14Sep 3, 2024Updated last year
- A dataset for realistic evaluation of noisy label methods☆14Dec 3, 2023Updated 2 years ago
- Code for NeurIPS'23 paper "A Bayesian Approach To Analysing Training Data Attribution In Deep Learning"☆17Jan 12, 2024Updated 2 years ago
- ☆13Jul 23, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for the CVPR 2020 article "Adversarial Vertex mixup: Toward Better Adversarially Robust Generalization"☆12Jul 13, 2020Updated 5 years ago
- The source code of paper "Dynamic Ensemble Selection for Imbalanced Data Streams with Concept Drift"☆12May 7, 2023Updated 2 years ago
- Official repository for Is your noise correction noisy? PLS: Robustness to label noise with two stage detection WACV 2023☆20Dec 6, 2022Updated 3 years ago
- 语音情绪分析☆13Mar 4, 2014Updated 12 years ago
- Process automatic identification system (AIS) shipping data for various development purposes☆16Nov 30, 2021Updated 4 years ago
- [pyconau 2017 talk] Messy Sensor Data: A Programmer's Cleaning Guide☆18Aug 13, 2020Updated 5 years ago
- Object detection task. Detect various objects (including dangerous ones like guns, knives etc ) present in bags from X-ray images of bags…☆11May 3, 2020Updated 5 years ago
- bundle_adjustment☆17Sep 2, 2019Updated 6 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 3 years ago
- Basic HTML & CSS Web Link Profile seperti Link Tree☆10Feb 27, 2023Updated 3 years ago
- Implementation of popular agreement metrics such as Cohen kappa, Fleiss kappa, Krippendorff alpha☆16Apr 2, 2022Updated 3 years ago
- ☆10Dec 12, 2019Updated 6 years ago
- ☆18Mar 1, 2022Updated 4 years ago
- [CVPRW 2023] Diversity is Definitely Needed: Improving Model-Agnostic Zero-shot Classification via Stable Diffusion☆24Jan 24, 2024Updated 2 years ago
- Indonesian Localization Project☆13Sep 30, 2025Updated 5 months ago
- ☆23Apr 30, 2022Updated 3 years ago
- Serial to MQTT adapter serivce☆24Jun 13, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 4 years ago
- Pytorch implementation of Neural Opacity Point Cloud.☆20Dec 25, 2020Updated 5 years ago
- Code for paper "Label Noise Types and Their Effects on Learning"☆18Nov 14, 2022Updated 3 years ago
- Code for paper: “What Data Benefits My Classifier?” Enhancing Model Performance and Interpretability through Influence-Based Data Selecti…☆23May 17, 2024Updated last year
- A project that trains a neural network to recognize certain types of movie scenes (i.e: every drinking scene from Mad Men, every kissing …☆20Dec 8, 2022Updated 3 years ago
- ☆14Jul 15, 2018Updated 7 years ago
- Laravel API Token Authentication example☆10May 23, 2020Updated 5 years ago