Unparalleled-Calvin / Fudan-course-search
☆9Updated 3 years ago
Alternatives and similar repositories for Fudan-course-search:
Users that are interested in Fudan-course-search are comparing it to the libraries listed below
- ICS_2020_PJ☆10Updated 4 years ago
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆73Updated last month
- ☆20Updated this week
- Course Website for ICS Spring 2020 at Fudan University https://sunfloweraries.github.io/ICS-Spring20-Fudan/☆12Updated 4 years ago
- Official PyTorch code for ICLR 2025 paper "Gnothi Seauton: Empowering Faithful Self-Interpretability in Black-Box Models"☆13Updated last month
- Course Website for OS Autumn 2021 at Fudan University☆14Updated 3 years ago
- Official Repository for The Paper: Safety Alignment Should Be Made More Than Just a Few Tokens Deep☆89Updated 9 months ago
- PDM-based Purifier☆20Updated 5 months ago
- THU 编译原理课实验 -- 删减版 C 语言编译器(report 中思考题部分有错误)Updated 3 years ago
- ☆18Updated last year
- ☆23Updated 2 years ago
- [ICLR 2025] DeFT: Decoding with Flash Tree-attention for Efficient Tree-structured LLM Inference☆20Updated last week
- ☆63Updated 6 months ago
- ⚡ Bring some magic to i.sjtu.edu.cn☆20Updated 5 years ago
- ☆25Updated 8 months ago
- ☆23Updated 10 months ago
- Efficient Expert Pruning for Sparse Mixture-of-Experts Language Models: Enhancing Performance and Reducing Inference Costs☆16Updated 4 months ago
- Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)☆12Updated last year
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆18Updated last year
- 美赛爬虫,美国大学生数学建模竞赛证书爬取及信息OCR识别分析☆18Updated 2 years ago
- [CVPR2024 highlight] Generalized Large-Scale Data Condensation via Various Backbone and Statistical Matching (G-VBSM)☆28Updated 6 months ago
- [CVPR 2024] official code for SimAC☆18Updated 3 months ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆65Updated last month
- ☆18Updated 3 years ago
- An auxiliary project analysis of the characteristics of KV in DiT Attention.☆29Updated 4 months ago
- ☆88Updated 3 years ago
- Code for the paper "Exploring Backdoor Vulnerabilities of Chat Models"☆14Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆45Updated last year
- List of T2I safety papers, updated daily, welcome to discuss using Discussions☆61Updated 8 months ago
- Respect to the input tensor instead of paramters of NN☆18Updated 2 years ago