☆15Dec 19, 2022Updated 3 years ago
Alternatives and similar repositories for CSA
Users that are interested in CSA are comparing it to the libraries listed below
Sorting:
- ☆16Dec 18, 2023Updated 2 years ago
- official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Att…☆20Oct 28, 2022Updated 3 years ago
- signal denoising + modulation recognition☆10Aug 7, 2018Updated 7 years ago
- ☆15Jan 14, 2025Updated last year
- ☆17Mar 22, 2025Updated 11 months ago
- ☆10Dec 3, 2023Updated 2 years ago
- Large AI model for wireless localization☆19Jun 18, 2025Updated 8 months ago
- Pytorch code of IGARSS2025 paper "MergeSAM: Unsupervised Change Detection of remote sensing Images Based on the Segment Anything Model"☆18Nov 5, 2025Updated 3 months ago
- ☆11May 6, 2021Updated 4 years ago
- [ICCV 2023] Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting☆15Nov 30, 2023Updated 2 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- [TPAMI2025] BackMix: Regularizing Open Set Recognition by Removing Underlying Fore-Background Priors☆14Apr 23, 2025Updated 10 months ago
- WiSR: Wireless Domain Generalization Based on Style Randomization☆11Nov 17, 2023Updated 2 years ago
- Public WiFi Dataset☆16Jan 23, 2024Updated 2 years ago
- Single-Source Domain Generalization for Bearing Fault Diagnosis Using Feature-Augmented Adaptive Neuro-Fuzzy Inference System☆11Apr 13, 2024Updated last year
- pFedDef: Defending Grey-Box Attacks for Personalized Federated Learning☆10May 31, 2023Updated 2 years ago
- ☆14Jun 21, 2023Updated 2 years ago
- ☆14Apr 1, 2025Updated 11 months ago
- ☆42Sep 5, 2023Updated 2 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆38Jun 14, 2023Updated 2 years ago
- ☆15Oct 16, 2024Updated last year
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- ☆11Jun 1, 2023Updated 2 years ago
- This repo contains the PUF and authentication codes for IoT authentication protocol development project☆12Apr 11, 2020Updated 5 years ago
- rPPG-based Biometric Authentication☆11Jun 3, 2025Updated 9 months ago
- An Open-Source Simulation Framework for WiFi-CSI-Based Multi-Robot Localization Systems. Code and setup files☆12Sep 9, 2024Updated last year
- ☆11May 24, 2022Updated 3 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- Image manipulation detection☆12Feb 10, 2022Updated 4 years ago
- The Pytorch implementation of "RSCNet: Dynamic CSI Compression for Cloud-based WiFi Sensing"☆13Sep 25, 2024Updated last year
- Awesome-Adversarial-Attack-Methods-Summary☆12Jul 24, 2024Updated last year
- ☆13May 24, 2023Updated 2 years ago
- Official source code for Time is Not Enough: Time-Frequency based Explanation for Time-Series Black-Box Models☆12Dec 5, 2024Updated last year
- ☆13Jan 31, 2024Updated 2 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆20Sep 9, 2025Updated 5 months ago
- Details of the datasets for Few-shot class-incremental audio classification☆11Dec 6, 2023Updated 2 years ago
- EraseDiff: Erasing Data Influence in Diffusion Models☆14Nov 20, 2024Updated last year
- Radio Map Estimation (REM) with limited and quantized measurements.☆11Jul 21, 2025Updated 7 months ago
- Yali Zhang, Haifan Yin, Weidong Li, Emil Björnson, Mérouane Debbah, "Port-LLM: A Port Prediction Method for Fluid Antenna based on Large …☆15Sep 1, 2025Updated 6 months ago