☆11Mar 31, 2022Updated 4 years ago
Alternatives and similar repositories for Reverse-Engineering-of-Imperceptible-Adversarial-Image-Perturbations
Users that are interested in Reverse-Engineering-of-Imperceptible-Adversarial-Image-Perturbations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project is the codes to generate universal adversarial perturbations for EEG-based BCIs.☆11Jul 9, 2020Updated 5 years ago
- ☆14Nov 19, 2021Updated 4 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆16Feb 15, 2022Updated 4 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- ☆12Feb 18, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Dockerfile for johnsmith0031/alpaca_lora_4bit☆12Apr 10, 2023Updated 3 years ago
- A JupyterBook site for napari workshop materials☆10Jul 11, 2022Updated 3 years ago
- ☆19Oct 27, 2021Updated 4 years ago
- Code repo for E-Energy 2019 paper☆18May 2, 2020Updated 6 years ago
- Official repository of "Deep Image Composition Meets Image Forgery"☆13May 30, 2024Updated last year
- Sets of Image Provenance cases, including node and edge information, generated automatically using Reddit Photoshop Battles☆14Jul 26, 2018Updated 7 years ago
- Code for the paper "Unbiased Supervised Contrastive Learning" | ICLR 2023 https://openreview.net/forum?id=Ph5cJSfD2XN☆12Sep 22, 2023Updated 2 years ago
- Implementation of Implicit Graphon Neural Representation☆14Sep 1, 2023Updated 2 years ago
- Transformer Model to detect deepfakes from popular datasets. Predictions made on embeddings (features) generated by a different ViT model…☆14Nov 27, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Deep Learning And Reinforcement Learning☆11Mar 28, 2017Updated 9 years ago
- Processing of eye tracking data, using the Pupil Labs eye tracker, for the measure of cognitive workload.☆15Apr 21, 2026Updated 2 weeks ago
- GenerativeArt with Blender Python API (bpy)☆11Oct 30, 2021Updated 4 years ago
- A prototypical implementation for the construction of data sets containing False Data Injection Attacks and evaluating the performance of…☆16Aug 30, 2018Updated 7 years ago
- ☆11Jun 14, 2024Updated last year
- Fall 2019 repository with course materials for JHU Advanced Data Science☆11Dec 11, 2019Updated 6 years ago
- DiffClass: Diffusion-Based Class Incremental Learning☆12Sep 26, 2024Updated last year
- ☆16May 23, 2024Updated last year
- ☆15Oct 17, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆25Mar 13, 2022Updated 4 years ago
- ☆11Mar 15, 2023Updated 3 years ago
- oracle-structured minimization method☆13Sep 1, 2021Updated 4 years ago
- ☆12Feb 26, 2024Updated 2 years ago
- [CIKM'23] Test Time Embedding Normalization for Popularity Bias Mitigation☆15Jan 9, 2024Updated 2 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- Deep Learning - Robustness - Immune System☆13Jun 20, 2021Updated 4 years ago
- Sample code for "Sonic instruments" & "Interactive Sonification" workshops: tools designed with Pure Data & Processing☆21May 9, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- [NeurIPS2024] Fast and Memory-Efficient Video Diffusion Using Streamlined Inference☆18Dec 3, 2024Updated last year
- Official implementation of "Multi-armed Bandit Algorithm against Strategic Replication"☆14May 17, 2022Updated 3 years ago
- [ECCV2022] Compiler-Aware Neural Architecture Search for On-Mobile Real-time Super-Resolution☆26Jan 12, 2023Updated 3 years ago
- ☆11Jun 25, 2016Updated 9 years ago
- This repo contains code and visualisation for "Robust moving target defence against false data injection attacks in power grids"☆26Dec 8, 2022Updated 3 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago