Assignments for NUS ME5404/EE5904 Neural Networks for Semester 2 AY18/19
☆20Jun 9, 2019Updated 6 years ago
Alternatives and similar repositories for NUS-EE5904-Neural-Networks
Users that are interested in NUS-EE5904-Neural-Networks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Robust Adversarial Objects against Deep Learning Models☆12Mar 28, 2020Updated 6 years ago
- [EMNLP 2024 Main] Code for the paper "Dissecting Fine-Tuning Unlearning in Large Language Models"☆15Oct 10, 2024Updated last year
- 哈尔滨工业大学(深圳)2022 春季学期计算机网络 实验☆22May 22, 2022Updated 3 years ago
- [EMNLP 2025 Main] ConceptVectors Benchmark and Code for the paper "Intrinsic Evaluation of Unlearning Using Parametric Knowledge Traces"☆39Aug 20, 2025Updated 7 months ago
- Generating RGB photos from RAW image files with PyNET-v2 Mobile☆26Jun 16, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆22Mar 15, 2023Updated 3 years ago
- Starter code for the NTIRE 2023 Bokeh Effect Transformation Challenge☆29Feb 20, 2023Updated 3 years ago
- [ Official ] - Toward Interactive Modulation for Photo-Realistic Image Restoration. CVPRW 2021 NTIRE.☆23Feb 23, 2022Updated 4 years ago
- ☆12May 6, 2022Updated 3 years ago
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆40Sep 17, 2025Updated 6 months ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Mar 26, 2026Updated 2 weeks ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Dec 23, 2019Updated 6 years ago
- Code for our paper 'Transform your Smartphone into a DSLR Camera: Learning the ISP in the Wild' accepted at ECCV 2022☆35Mar 30, 2023Updated 3 years ago
- ☆11Jul 31, 2022Updated 3 years ago
- ☆14Feb 26, 2025Updated last year
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- ☆11Dec 9, 2018Updated 7 years ago
- ☆12Jul 30, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Oct 31, 2022Updated 3 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated 3 months ago
- ☆14Oct 21, 2021Updated 4 years ago
- Convexified Convolutional Neural Networks☆15Dec 13, 2016Updated 9 years ago
- Official repository for the AAAI2026 paper (Zooming In on Fakes: A Novel Dataset for Localized AI-Generated Image Detection with Forgery …☆22Feb 4, 2026Updated 2 months ago
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Oct 30, 2024Updated last year
- ☆15Apr 4, 2024Updated 2 years ago
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- ☆12Dec 9, 2022Updated 3 years ago
- Code for the CVPR '23 paper, "Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning"☆10Jun 9, 2023Updated 2 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- ☆11Dec 18, 2024Updated last year