神经网络可视化
☆183Apr 21, 2021Updated 4 years ago
Alternatives and similar repositories for nn_visualization
Users that are interested in nn_visualization are comparing it to the libraries listed below
Sorting:
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- [CVPR 2025] AIGV-Assessor: Benchmarking and Evaluating the Perceptual Quality of Text-to-Video Generation with LMM☆18Aug 6, 2025Updated 7 months ago
- Official code implement of "Your Diffusion Model is Secretly a Certifiably Robust Classifier"☆18Feb 2, 2024Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- 参考taviso的代码逆向一下mpengine.dll☆20Jun 30, 2022Updated 3 years ago
- list of papers, code, datasets and other resources☆14Jul 22, 2022Updated 3 years ago
- AppContainerBypass☆21Apr 4, 2021Updated 4 years ago
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆118Mar 30, 2022Updated 3 years ago
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 7 years ago
- code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"☆20Oct 19, 2023Updated 2 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- ☆24Mar 30, 2021Updated 4 years ago
- 机器学习安全相关论文、代码☆42Sep 1, 2019Updated 6 years ago
- Next Generation Distributed Web Security Scanner with Futuristic Architecture and UI 混沌守望者(扫描器),多策略(爬虫扫描&POC 扫描)、模块化、分布式的智能网络空间测绘、管理与安全…☆208Oct 31, 2020Updated 5 years ago
- Baimless Full Source Code Leak☆28Apr 23, 2020Updated 5 years ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- ☆30Jul 19, 2024Updated last year
- 基于深度学习的风电机组机械故障智能识别方法研究☆13Apr 13, 2024Updated last year
- Collection of AI and Security Papers☆27Apr 17, 2020Updated 5 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Jun 1, 2019Updated 6 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆31Apr 16, 2022Updated 3 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Aug 17, 2023Updated 2 years ago
- Guide to build FFmpeg from source with Netflix's libvmaf on Ubuntu 18.04☆11Oct 12, 2020Updated 5 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- DLInjector for Graphical User Interface.☆35Jan 28, 2021Updated 5 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- OneForAll-WebUI☆34Jan 6, 2023Updated 3 years ago
- Research on adversarial attacks and defenses for deep neural network 3D point cloud classifiers like PointNet and PointNet++.☆27May 22, 2020Updated 5 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆36Jan 15, 2022Updated 4 years ago
- Windows Sandbox Framework☆40Dec 31, 2021Updated 4 years ago
- PE file parser☆37Sep 13, 2015Updated 10 years ago
- Screen Magnification Lens for Windows 10☆15Jul 5, 2025Updated 8 months ago
- 用CGAN训练时频域特征生成特征样本,数据集非图片数据集,用到了dataset自定义的数据集。☆12Apr 30, 2022Updated 3 years ago
- Implementation of followinf estimation algorithms in python: Kalman Filter, Extended Kalman Filter, Unscented Kalman Filter, Cubature Kal…☆11Dec 2, 2023Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91May 10, 2021Updated 4 years ago