☆16Mar 31, 2025Updated last year
Alternatives and similar repositories for OSS-FGI
Users that are interested in OSS-FGI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LLMs for autonomous reasoning and analysis of firmware☆34Apr 2, 2025Updated last year
- Official implementation of COLosSAL [MICCAI 2023]☆15Jul 22, 2023Updated 2 years ago
- Docker container with all extra tools installed to get the most out of binwalk☆20Dec 17, 2020Updated 5 years ago
- Watermarking LLM papers up-to-date☆12Dec 17, 2023Updated 2 years ago
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Keys for Programming Assignments of Coursera Course Deep Learning Specialization by Andrew Ng☆20Jan 12, 2019Updated 7 years ago
- ECNU 校园网定时自动登录☆14Jul 24, 2024Updated last year
- ☆14Dec 31, 2024Updated last year
- 🤖 A multilingual translation tool that automatically converts Hugging Face's daily AI research papers into 🇯🇵 Japanese, 🇰🇷 Korean, �…☆18Updated this week
- TxtReader in Swift, originated from dengzemiao/DZMeBookRead☆47Sep 3, 2021Updated 4 years ago
- Composite Backdoor Attacks Against Large Language Models☆25Apr 12, 2024Updated 2 years ago
- TIFS2022: Decision-based Adversarial Attack with Frequency Mixup☆22Aug 8, 2023Updated 2 years ago
- FirmSec Dataset☆48Oct 15, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 车道线检测☆18Jun 23, 2020Updated 5 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆65Aug 22, 2023Updated 2 years ago
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆27Aug 21, 2023Updated 2 years ago
- Repo2Run is an LLM-based agent that automates environment configuration by generating error-free Dockerfiles for Python repositories.☆181Nov 18, 2025Updated 5 months ago
- ☆35Dec 16, 2022Updated 3 years ago
- 道路裂缝识别☆26Jan 14, 2019Updated 7 years ago
- ☆47Feb 13, 2026Updated 2 months ago
- For Competition on Adversarial Attacks and Defenses 2018☆39Jan 4, 2019Updated 7 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Nov 28, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [MedIA] Paper list and source code for survey "A comprehensive survey on deep active learning in medical image analysis"☆133Jun 7, 2025Updated 10 months ago
- 中文基于满血DeepSeek-R1蒸馏数据集☆63Feb 21, 2025Updated last year
- 一个探地雷达图像处理项目,已实现B-Scan图像病害提取、病害类型甄别、二层钢筋识别、病害厘米级定位等功能,待实现的功能有声呐图像处理、利用深度学习实现病害分类等。☆57Sep 11, 2018Updated 7 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Nov 17, 2022Updated 3 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆51Feb 27, 2021Updated 5 years ago
- An online judge system designed for OI training.☆54Jun 5, 2020Updated 5 years ago
- DISTIL: Deep dIverSified inTeractIve Learning. An active/inter-active learning library built on py-torch for reducing labeling costs.☆156Feb 5, 2023Updated 3 years ago
- A curated list of papers for the transferability of adversarial examples☆77Jul 8, 2024Updated last year
- 多轮共情对话模型PICA☆98Sep 11, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [NDSS 2026] Secure Transformer Inference is a protocol for serving Transformer-based models securely.☆98May 8, 2024Updated last year
- ☆82Jan 20, 2020Updated 6 years ago
- llm theoretical performance analysis tools and support params, flops, memory and latency analysis.☆117Jul 11, 2025Updated 9 months ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆127Jan 30, 2018Updated 8 years ago
- Lumina Note - A modern Markdown note-taking app with live preview, bidirectional links, and AI assistant☆853Updated this week
- The official PyTorch implementation of the ICLR2022 paper, QDrop: Randomly Dropping Quantization for Extremely Low-bit Post-Training Quan…☆130Sep 23, 2025Updated 7 months ago
- the note of javase☆373Jun 21, 2022Updated 3 years ago