VamshikShetty / adversarial-neural-cryptography-tensorflow
Mimicking symmetric cryptosystem using adversarial networks to show that neural nets are able to learn to communicate with each other securely
☆8Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for adversarial-neural-cryptography-tensorflow
- An implementation of the ICLR 2017 paper 'Learning to Protect Communications with Adversarial Neural Cryptography' while extending it in …☆9Updated 7 years ago
- Protect communications with adversarial neural cryptography.☆12Updated 6 years ago
- StarGAN-v2 non-official implementation, work in progressive☆10Updated 4 years ago
- We are looking to predict, visualize and act to contain the 2019 n-Corona Virus, through the power of data science.☆21Updated 3 years ago
- Code release for "GAN-Tree: An Incrementally Learned Hierarchical Generative Framework for Multi-Modal Data Distributions", ICCV 2019☆13Updated 2 years ago
- Experiments with different loss functions for image classification☆20Updated 7 years ago
- StyleGAN, ProGAN, and ResNet GANs to experiment with☆14Updated 3 years ago
- Code for "Training Generative Adversarial Networks with Binary Neurons by End-to-end Backpropagation"☆26Updated 5 years ago
- This repository contains my notes for the research papers that I read for anyone to briefly glance over the details.☆13Updated 6 years ago
- Image marine sea litter prediction Shiny☆21Updated 4 years ago
- Generating audio using a Generative Adversarial Network☆14Updated 4 years ago
- Code for our paper "CliqueCNN: Deep Unsupervised Exemplar Learning" https://arxiv.org/abs/1608.08792☆23Updated 7 years ago
- Codes for Category-aware Generative Adversarial Networks (AAAI 2020)☆18Updated 4 years ago
- Implements EvoNorms B0 and S0 as proposed in Evolving Normalization-Activation Layers.☆11Updated 4 years ago
- Reproduce GTSRB results of classic deep learning papers.☆21Updated 4 years ago
- Tensorflow 2.x implementation of Gradient Origin Networks☆13Updated 4 years ago
- Meta-SGD Algorithms Implementation☆21Updated 4 months ago
- A pure-Swift implementation of Covariance Matrix Adaptation Evolutionary Strategy (CMA-ES).☆23Updated 4 years ago
- Ranger - a synergistic optimizer using RAdam (Rectified Adam) and LookAhead in one codebase☆10Updated 2 years ago
- Source code for "Towards a Deeper Understanding of Adversarial Losses under a Discriminative Adversarial Network Setting"☆42Updated 2 years ago
- Human or Machine? It Is Not What You Write, But How You Write It☆9Updated 4 years ago
- Embedded Vision for Baby Behavior Monitoring in IoT☆15Updated 3 years ago
- Illustration of how to create TFRecord with images and pipelined into Datasets and Iterators☆15Updated 6 years ago
- Simple Tensorflow implementation of "SRM : A Style-based Recalibration Module for Convolutional Neural Networks"☆18Updated 5 years ago
- ☆9Updated 6 years ago
- Code for our ICLR Trustworthy ML 2020 workshop paper "Improved Image Wasserstein Attacks and Defenses"☆13Updated 4 years ago
- Universal Python binding for the LMDB 'Lightning' Database☆12Updated 7 years ago
- Deep neural architecture research framework☆12Updated last year
- Colab notebooks for d2l-book☆11Updated 4 years ago