Download opensource components from official site
☆50May 16, 2025Updated last year
Alternatives and similar repositories for Official_Component_Download
Users that are interested in Official_Component_Download are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Toxic Euphemisms Detection Framework for Online Social Network Based On Contrastive Learning and Dual-channe Network Augmentationl☆67May 15, 2025Updated last year
- ☆93May 14, 2025Updated last year
- Lightweight Python web framework☆70May 16, 2025Updated last year
- 网络空间元搜索引擎☆76Jun 2, 2025Updated 11 months ago
- 基于LLM和证据检索的虚假新闻自动检测系统☆441Sep 30, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Pytorch implementation of SemiMAR: Semi-Supervised Learning for CT Metal Artifact Reduction☆18Mar 2, 2024Updated 2 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Knowtate is a sophisticated platform designed to elevate your academic research experience. Seamlessly blend reading, note-taking with ma…☆12Sep 19, 2024Updated last year
- ☆10Jul 19, 2023Updated 2 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- ☆11Jul 2, 2025Updated 10 months ago
- 中文恶意网页检测数据集与检测方法☆21Mar 4, 2025Updated last year
- Analysis of a generic pcap file containing a DNS-based DDoS attack☆11Mar 6, 2022Updated 4 years ago
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆21Oct 8, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- SimGNN: A Neural Network Approach to Fast Graph Similarity Computation [WSDM-2019]☆10Apr 18, 2024Updated 2 years ago
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- A video-based distracted driver detection system.☆26Oct 26, 2022Updated 3 years ago
- ☆59Feb 27, 2026Updated 2 months ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- Official code of HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection.☆11Apr 14, 2025Updated last year
- ☆23Jan 4, 2021Updated 5 years ago
- [paper] Deepfake detection model based on fake attributes shown in image/video☆10Nov 6, 2020Updated 5 years ago
- 在信息化时代,互联网中存储着海量多模态、多类型的资源。这些资源中包含了大量网络公害数据,例如黄赌毒、电信诈骗、网络敲诈、网络谣言、虚假新闻等。其中,数据的载体包括文本、图像、音频、视频,并且以非结构化或者半结构化形式存在。构建面向网络公害治理的知识图谱的任务是对这些海量多模…☆12Jul 13, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Official implementation for "HuRef: HUman-REadable Fingerprint for Large Language Models" (NeurIPS2024)☆16Jun 17, 2025Updated 11 months ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆85Apr 1, 2023Updated 3 years ago
- ☆15Jun 21, 2022Updated 3 years ago
- 自然语言处理之中文文本分类(以垃圾短信识别为例)☆24Jun 4, 2020Updated 5 years ago
- Kaggle challenge of ai-generated text detection☆13Feb 13, 2024Updated 2 years ago
- ☆12Jun 21, 2020Updated 5 years ago
- CISP(NISP二级)题库☆16Apr 22, 2024Updated 2 years ago
- A curated collection of the latest academic research papers and developments in AI Security. This repository aims to provide a comprehens…☆20Mar 23, 2024Updated 2 years ago
- ☆39Jul 16, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- WOUAF: Weight Modulation for User Attribution and Fingerprinting in Text-to-Image Diffusion Models (CVPR 2024)☆26Jun 14, 2024Updated last year
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆22Nov 30, 2024Updated last year
- The Official Implementation for paper "Chain-of-Restoration: Multi-Task Image Restoration Models are Zero-Shot Step-by-Step Universal Ima…☆19Oct 14, 2024Updated last year
- ☆37Oct 10, 2025Updated 7 months ago
- CFAD: A Chinese Dataset for Fake Audio Detection☆24Jul 3, 2023Updated 2 years ago
- ☆15Apr 18, 2024Updated 2 years ago
- Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis☆21Dec 2, 2021Updated 4 years ago