Jonathan-Birkey / IntroductionToJavaProgrammingLinks
Introduction to Java Programming and Data Structures Comprehensive Version 12
☆12Updated last year
Alternatives and similar repositories for IntroductionToJavaProgramming
Users that are interested in IntroductionToJavaProgramming are comparing it to the libraries listed below
Sorting:
- K- fold cross validation for KNN , Linear Regression and Centroid classifiers☆10Updated 9 years ago
- Offering recent HAR papers collection☆26Updated 4 years ago
- neural style tranfer from one walking/gait cycle to another; ArXiv:1606.03238 & ArXiv:1508.06576☆14Updated 8 years ago
- Mobile Android app for data collection in the wild: sensor measurements and self-reported labels describing the user's behavioral context…☆29Updated 7 years ago
- Code repository for experiments on deep architecture for HAR in ubicomp☆25Updated 8 years ago
- Code for discriminative joint probability MMD (DJP-MMD)☆46Updated 4 years ago
- Source code for EAC-Net in Theano/Pytorch/Tensorflow☆20Updated 8 years ago
- Python script for downloading the FaceScrub face dataset.☆32Updated 7 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Updated 8 years ago
- Official implementation of our NeurIPS2021 paper: Relative Uncertainty Learning for Facial Expression Recognition☆56Updated 3 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 3 years ago
- ☆26Updated 6 years ago
- Repository for the Learning without Forgetting paper, ECCV 2016☆86Updated 5 years ago
- ☆43Updated 5 years ago
- DSN/Tensorflow☆18Updated 8 years ago
- Code for data processing used for the experiment in paper "Deepsense: a unified deep learning framework for time-series mobile sensing da…☆29Updated 8 years ago
- AROMA: A Deep Multi-Task Learning Based Simple and Complex Human Activity Recognition Method Using Wearable Sensors☆29Updated 7 years ago
- NIPS 2017 - Adversarial Learning☆35Updated 8 years ago
- 🧠 A PyTorch implementation of 'Deep CORAL: Correlation Alignment for Deep Domain Adaptation.', ECCV 2016☆238Updated 4 years ago
- Code for NDSS paper: Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems☆21Updated 7 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆111Updated 7 years ago
- Deep domain adaptation networks (DDAN) library for Python with TensorFlow.☆75Updated 6 years ago
- ☆17Updated 8 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Updated 5 years ago
- TRAINING DEEP NEURAL-NETWORKS USING A NOISE ADAPTATION LAYER☆119Updated 8 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Updated 6 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Updated 6 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆134Updated 7 years ago
- This is an implementation of the Extreme Value Machine by Rudd et al., with minor changes from the original work.☆54Updated 7 years ago
- Generating Natural Adversarial Examples, ICLR 2018☆142Updated 7 years ago