ZTX-100 / Efficient_ViT_with_DWView external linksLinks
☆38Jan 24, 2025Updated last year
Alternatives and similar repositories for Efficient_ViT_with_DW
Users that are interested in Efficient_ViT_with_DW are comparing it to the libraries listed below
Sorting:
- Official implementation for "Knowledge Distillation with Refined Logits".☆21Aug 26, 2024Updated last year
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated last year
- [AAAI 2025] Trusted Unified Feature-Neighborhood Dynamics for Multi-View Classification☆19Apr 17, 2025Updated 9 months ago
- Implementation of paper - RepVGG-GELAN: ENHANCED GELAN WITH VGG-STYLE CONVNETS FOR BRAIN TUMOR DETECTION☆10Jul 19, 2025Updated 6 months ago
- [ICPR 2024] Official repository of the paper "GenFormer - Generated Images are All You Need to Improve Robustness of Transformers on Smal…☆14Aug 30, 2024Updated last year
- ☆12Jan 2, 2025Updated last year
- ☆11Jan 23, 2024Updated 2 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆14Oct 17, 2024Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- HINT: High-quality INpainting Transformer with Enhanced Attention and Mask-aware Encoding☆54Jan 14, 2025Updated last year
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- An implementation of a Capsule Attention Network.☆10Jan 26, 2018Updated 8 years ago
- ☆10Nov 13, 2025Updated 3 months ago
- ☆12Aug 19, 2023Updated 2 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- ☆13Sep 23, 2024Updated last year
- Smart Agent Survey is an application that automates survey response generation by processing survey documents and creating multiple synth…☆11Aug 30, 2025Updated 5 months ago
- ActiveHARNet: Towards On-Device Deep Bayesian Active Learning for Human Activity Recognition☆12Nov 7, 2020Updated 5 years ago
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 2 years ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆12Aug 14, 2025Updated 6 months ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- [ICRA 2024] GelRoller: A Rolling Vision-based Tactile Sensor for Large Surface Reconstruction Using Self-Supervised Photometric Stereo Me…☆12Sep 23, 2024Updated last year
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated last year
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- SPLINE-Net: Sparse Photometric Stereo through Lighting Interpolation and Normal Estimation Networks☆11Apr 13, 2023Updated 2 years ago
- official implementation of Training-free Boost for Open-Vocabulary Object Detection with Confidence Aggregation☆13Apr 15, 2024Updated last year
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆19Sep 9, 2025Updated 5 months ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- HSTGODE code☆10Nov 26, 2023Updated 2 years ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆14Jan 22, 2025Updated last year
- [MICCAI 2024] RadiomicsFill-Mammo: Synthetic Mammogram Mass Manipulation with Radiomics Features☆10Aug 22, 2025Updated 5 months ago
- ☆13Dec 5, 2022Updated 3 years ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- ☆10May 26, 2024Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- 한글 인식기☆10May 7, 2022Updated 3 years ago