☆14Apr 6, 2025Updated 11 months ago
Alternatives and similar repositories for TASER
Users that are interested in TASER are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Oct 18, 2023Updated 2 years ago
- Code of paper "AdvReverb: AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception"☆19Nov 26, 2023Updated 2 years ago
- Defending against Adversarial Audio via Diffusion Model (ICLR 2023)☆35Mar 2, 2023Updated 3 years ago
- AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. I…☆11Nov 21, 2023Updated 2 years ago
- ☆12Nov 30, 2021Updated 4 years ago
- Audio Jailbreak: An Open Comprehensive Benchmark for Jailbreaking Large Audio-Language Models☆31Oct 6, 2025Updated 5 months ago
- ☆24Dec 20, 2022Updated 3 years ago
- An ASR (Automatic Speech Recognition) adversarial attack repository.☆39Nov 7, 2023Updated 2 years ago
- esp32-cam + micropython + flask + yolo打造web视频监控和目标检测☆11Jan 13, 2023Updated 3 years ago
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- WeNet 实战课程作业☆20Oct 7, 2022Updated 3 years ago
- ☆10Mar 17, 2021Updated 5 years ago
- Official implementation of Visco-Attack (EMNLP 2025 Main). We will progressively release the code and one-click reproduction scripts.☆30Aug 22, 2025Updated 7 months ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- Chinese-native image generation while compatible with SD eco-system, 1st-gen, AAAI2025☆13Jun 25, 2024Updated last year
- Baby Monitoring System was trained with LSTM network☆18Feb 15, 2023Updated 3 years ago
- A TensorFlow implementation of light convolutional neural network (LCNN)☆12Dec 27, 2018Updated 7 years ago
- ☆82Jun 10, 2024Updated last year
- Collection of NLP Project and Data Analysis☆16Dec 5, 2023Updated 2 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- Embedded Vision for Baby Behavior Monitoring in IoT☆17Feb 4, 2021Updated 5 years ago
- A simple compiler for SysY (tiny C). Based on Bison, LLVM.☆10Dec 24, 2024Updated last year
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- ☆18Aug 23, 2024Updated last year
- 20 Machine Learning Projects on NLP 20 Machine Learning Projects on NLP Solved and Explained with Python.☆15Apr 19, 2022Updated 3 years ago
- Official code for Generative Fractional Diffusion Models☆17Jan 16, 2025Updated last year
- ☆22Apr 3, 2025Updated 11 months ago
- ☆14Oct 19, 2025Updated 5 months ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago
- ☆11May 15, 2025Updated 10 months ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- 当今海量的移动应用跟人们的生活、工作、学习、休闲、娱乐等方面密切相关,发挥着重要作用。多数APP在安装、更新时,都会向用户申请相关手机权限。多数终端用户缺乏鉴别APP所请求的权限是否合理的能力,并且APP安装使用过程中过度索要权限现象较为普遍,这就给用户数据安全、隐私信息泄…☆13Feb 11, 2020Updated 6 years ago
- ☆11Apr 12, 2024Updated last year
- Linux进程间通信(消息队列/信号量+共享内存)☆19Jun 8, 2018Updated 7 years ago
- Implementation of a differentially private generative adversarial network.☆11Nov 20, 2018Updated 7 years ago
- Speaker Verification using Pytorch☆13May 23, 2024Updated last year