ZJYCP / solutions4nndlView external linksLinks
邱锡鹏著《神经网络与深度学习》解答
☆18Dec 15, 2020Updated 5 years ago
Alternatives and similar repositories for solutions4nndl
Users that are interested in solutions4nndl are comparing it to the libraries listed below
Sorting:
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- 软件测试课程资料☆11Dec 1, 2023Updated 2 years ago
- ☆10Jul 5, 2023Updated 2 years ago
- PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models☆14Jan 3, 2025Updated last year
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- Basics for Machine Learning☆11Apr 26, 2020Updated 5 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago
- Code and data from the paper "Targeted Nonlinear Adversarial Perturbations in Images and Videos".☆11Sep 8, 2018Updated 7 years ago
- A Clone-Based Approach for Recommending Modification on Pasted Code☆12Jun 10, 2017Updated 8 years ago
- ☆12Sep 6, 2023Updated 2 years ago
- [AAAI2024] Decoupling Degradations with Recurrent Network for Video Restoration in Under-Display Camera.☆15Apr 18, 2024Updated last year
- https://openreview.net/forum?id=OC1o4_OI6Jw☆13May 27, 2022Updated 3 years ago
- An Advanced PHP Captcha Generator☆28Feb 29, 2016Updated 9 years ago
- Contrastive Dialogue Disentanglement via Clustering☆12Apr 26, 2023Updated 2 years ago
- YourChatGPT is a versatile AI chatbot solution that harnesses the capabilities of the ChatGPT API. Crafted to simplify your journey, it e…☆17Aug 21, 2023Updated 2 years ago
- Variational Inference by Policy Search☆13Apr 24, 2019Updated 6 years ago
- RapidIn: Scalable Influence Estimation for Large Language Models (LLMs). The implementation for paper "Token-wise Influential Training Da…☆21May 4, 2025Updated 9 months ago
- 2022华为软件精英挑战赛 江山赛区rank19(有用网络流),复赛rank2,决赛rank26☆14Jul 5, 2022Updated 3 years ago
- Python asyncio-based library that implements the SPAMC/SPAMD client protocol used by SpamAssassin.☆17Feb 3, 2026Updated last week
- Source code for CIKM 2021 paper “Topic-aware Heterogeneous Graph Neural Network for Link Prediction”☆18Mar 28, 2022Updated 3 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆15Aug 6, 2025Updated 6 months ago
- Implementations of 3 phishing detection and identification baselines☆20Nov 25, 2024Updated last year
- A project for computing differences of multiple clone instances.☆17Nov 4, 2019Updated 6 years ago
- [ACL 2024] PyTorch implementation for "Stealthy Attack on Large Language Model based Recommendation"☆19Jun 19, 2024Updated last year
- PerimeterX WSGI Middleware☆17Jun 18, 2024Updated last year
- how to use the Google Cloud Speech API to transcribe audio/video files.☆34Feb 18, 2019Updated 6 years ago
- Based on Pytorch, the Adversarial Attack algorithm DeepFool, targeting the Mnist data set and ResNet18 network☆16Jul 28, 2020Updated 5 years ago
- Paper, dataset and code list for multimodal dialogue.☆22Jan 2, 2025Updated last year
- ☆26Apr 2, 2024Updated last year
- A hybrid pipeline to screen compounds with DrugCLIP and Schrodinger☆37Jul 4, 2024Updated last year
- Code to generate NeuralExecs (prompt injection for LLMs)☆27Oct 5, 2025Updated 4 months ago
- Angular 5+ speech recognition service (based on browser implementation such as Chrome).☆25Apr 10, 2022Updated 3 years ago
- ☆28Jan 16, 2025Updated last year
- MASTERKEY is a framework designed to explore and exploit vulnerabilities in large language model chatbots by automating jailbreak attacks…☆31Sep 12, 2024Updated last year
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 3 years ago
- 大厂面试高频题,算法、python、java、behavior questions等☆30Sep 15, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago