Digital camera identification tool
☆20Mar 15, 2015Updated 11 years ago
Alternatives and similar repositories for camera-id
Users that are interested in camera-id are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A recurrent neural network model to analyze how travelers expressed their feelings on Twitter☆12Jun 30, 2019Updated 6 years ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- a vehicle roadway traffic simulator written in javascript, html and css. rendering is done via the HTML5 canvas.☆12Oct 8, 2023Updated 2 years ago
- Pure-python AVM library☆22Mar 12, 2026Updated 2 weeks ago
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16May 8, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Explanation Optimization☆13Oct 16, 2020Updated 5 years ago
- ☆24Apr 22, 2025Updated 11 months ago
- Copy–Move forgery or Cloning is a type of Image tampering where a part of the image is copied and pasted on another part of same image…☆18Oct 23, 2021Updated 4 years ago
- Add Rotary Encoders to your Raspberry Pi with ease☆11Sep 16, 2017Updated 8 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- JPEG Grid Detection based on the Number of DCT Zeros and its Application to Automatic and Localized Forgery Detection☆22Oct 25, 2022Updated 3 years ago
- Official repository for the AAAI-21 paper 'Explainable Models with Consistent Interpretations'☆18Apr 5, 2022Updated 3 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆13Feb 25, 2026Updated last month
- Web bluetooth for SP110E controller☆15Aug 2, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11Apr 27, 2020Updated 5 years ago
- Toy tool meant to extract translated descriptions of permissions and groups from AOSP☆13Jan 26, 2022Updated 4 years ago
- A collection of deep learning approaches and datasets publicly available for image forgery and deepfakes detection☆58Feb 17, 2020Updated 6 years ago
- Randomly simulate inception and settlement of general insurance losses☆16Mar 19, 2022Updated 4 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- RP235x based breakout board for grblHAL.☆19Dec 28, 2025Updated 2 months ago
- Real or Fake Text? Evaluation criteria for human-written and computer-generated text through the gamification of annotation. Published in…☆11Dec 22, 2022Updated 3 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆13Feb 13, 2025Updated last year
- Enemies for your LLM☆35Jan 20, 2026Updated 2 months ago
- [OPEN SOURCE Digital Forensics Tool] - State of the Art Image/Video Forensics Tool : Hybrid-G-PRNU-Extractor based on the work of Muammar…☆12May 6, 2020Updated 5 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- 用 TTGO_T_Watch 手表做的百度语音识别终端☆23Aug 21, 2019Updated 6 years ago
- Smart Contract Vulnerability Detection Using Graph Neural Networks☆17Jun 22, 2020Updated 5 years ago
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 4 months ago
- This repository contains codes to explain One-Dimensional Convolutional Neural Networks (1D-CNN) using Layer-wise Relevance Propagation.☆13Aug 24, 2021Updated 4 years ago
- some config files☆14Feb 23, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- a Firefox extension for reddit social news sites.☆17Apr 7, 2011Updated 14 years ago
- Implementation of YOLO (You Only Look Once) computer Vision algorithm in a React UI, for the subject Intelligent Systems (ULL)☆10Jan 27, 2019Updated 7 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- A simple retweet button.☆72Oct 5, 2009Updated 16 years ago
- Extremely simple MoE implementation, mostly based off Switch Transformer☆13Feb 26, 2024Updated 2 years ago
- An algorithm for finding people in different databases using fuzzy name matching☆27Jan 13, 2021Updated 5 years ago
- A really dumb proof of concept that bundles the nightly branch builds of all of the *arr applications into a single container.☆15Updated this week