Code for CVPR 2024 "Revisiting Adversarial Training under Long-Tailed Distributions".
☆159Mar 1, 2025Updated last year
Alternatives and similar repositories for AT-BSL
Users that are interested in AT-BSL are comparing it to the libraries listed below
Sorting:
- ☆145Mar 2, 2025Updated last year
- MPC(Multi-Party Computation) all in one.☆144Jan 26, 2026Updated last month
- ☆147Mar 31, 2025Updated 11 months ago
- [开源软件发布]基于蓝牙的病毒追踪系统,采用BLE低功耗蓝牙,通过SM3加密认证保护用户数据安全性,提供包括Android开发,IOS开发,以及Java服务器开发的完整代码和直接可以运行的apk文件☆152Jul 11, 2025Updated 7 months ago
- A secure IoT authentication framework based on hardware fingerprinting☆158Mar 1, 2025Updated last year
- ☆154Apr 28, 2025Updated 10 months ago
- ☆151Mar 31, 2025Updated 11 months ago
- ☆142Apr 1, 2025Updated 11 months ago
- efficient anti side channel SHA3 algorithm software and hardware co-design☆156Apr 21, 2025Updated 10 months ago
- SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs☆164Apr 21, 2025Updated 10 months ago
- ☆75May 23, 2025Updated 9 months ago
- 本项目基于兼具加密与计算双重能力的全同态加密算法、利用微软开源库Microsoft-Seal而设计出的一套能够保护医疗数据的云计算系统。☆64Mar 31, 2025Updated 11 months ago
- ☆146Aug 14, 2024Updated last year
- ☆166Mar 31, 2025Updated 11 months ago
- The implementation of our AAAI 2024 paper "Reverse Multi-Choice Dialogue Commonsense Inference with Graph-of-Thought"☆198Apr 5, 2025Updated 10 months ago
- Code for USENIX Security 2025 paper "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis …☆222Jan 27, 2026Updated last month
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- GAN you see me? enhanced data reconstruction attacks against split inference - NeurIPS 2023☆12Mar 26, 2025Updated 11 months ago
- ☆15Oct 5, 2024Updated last year
- ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation☆23Mar 1, 2025Updated last year
- Official implementation of the paper DiffDefence: defending against adversarial attacks via diffusion models. ICIAP 2023.☆20Feb 1, 2024Updated 2 years ago
- 更好的包装pwntools,提高编写pwn题exp效率的工具☆27Apr 3, 2021Updated 4 years ago
- Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"☆27May 9, 2023Updated 2 years ago
- ✌[ICLR 2024] Class Incremental Learning via Likelihood Ratio Based Task Prediction☆32Oct 29, 2024Updated last year
- ☆21Dec 14, 2025Updated 2 months ago
- 用于登录武汉大学校园网的 Shell 脚本☆28Dec 31, 2020Updated 5 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- A free and open-source focus stacking software that supports multi-focus image alignment and fusion.☆20Feb 5, 2026Updated last month
- ☆43Dec 1, 2025Updated 3 months ago
- [ISBI 2024] Official PyTorch implementation of Towards Cross-Domain Single Blood Cell Image Classification via Large-Scale LoRA-based Seg…☆11Aug 12, 2024Updated last year
- Open-source Human Feedback Library☆11Oct 25, 2023Updated 2 years ago
- Free C++ tutorials for beginners with 19 interactive lessons. Easy-to-follow programming guides with hands-on practice exercises.☆14Oct 23, 2025Updated 4 months ago
- [CVPR 2024] LoSh: Long-Short Text Joint Prediction Network for Referring Video Object Segmentation☆13Jun 17, 2024Updated last year
- Implementation of an X86 mini OS from scratch. Reference: https://github.com/yyu/osfs00☆11Jan 9, 2023Updated 3 years ago
- github军火库☆21May 24, 2017Updated 8 years ago
- The official PyTorch implementation of "An Attentional Multi-scale Co-evolving Model for Dynamic Link Prediction" (TheWebConf'23)☆11May 4, 2023Updated 2 years ago
- Machine learning algorithms implements with jax for machine learning in production in large scale dataset.☆14Updated this week
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- ☆46Aug 4, 2023Updated 2 years ago