Twitter algorithmic bias challenge winning submission
☆50Aug 11, 2021Updated 4 years ago
Alternatives and similar repositories for saliency_bias
Users that are interested in saliency_bias are comparing it to the libraries listed below
Sorting:
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- POLITICO's system for managing civic data☆20Dec 7, 2022Updated 3 years ago
- BrainProp: How the brain can implement reward-based error backpropagation☆17Dec 8, 2022Updated 3 years ago
- Prototyping static sites with x0 + glamorous + styled-system☆25May 22, 2018Updated 7 years ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆42Apr 24, 2019Updated 6 years ago
- Code for the paper "(De)Randomized Smoothing for Certifiable Defense against Patch Attacks" by Alexander Levine and Soheil Feizi.☆17Aug 22, 2022Updated 3 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- Is SIKE broken yet?☆20Feb 15, 2023Updated 3 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Jun 7, 2024Updated last year
- ☆10Feb 28, 2017Updated 9 years ago
- Fast multi-cluster navigation for K8s admins☆13Jul 19, 2024Updated last year
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 2 years ago
- Code for the paper "Distinguishing the Knowable from the Unknowable with Language Models"☆11Apr 15, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Zero Knowledge Virtual Machine from scratch implementing Pinocchio☆38Jul 25, 2023Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 7 months ago
- MIT PhD Thesis template☆11May 22, 2025Updated 9 months ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 3 years ago
- This is a Leaflet map of the local Fairphoners communities☆10Feb 23, 2026Updated 2 weeks ago
- Home sharing app for Hillary Clinton supporters☆10Jan 6, 2017Updated 9 years ago
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- Repository for the Machine Learning Failure Mode and Effects Analysis (ML FMEA) Template. The ML FMEA is detailed within the SAE World C…☆11Apr 3, 2025Updated 11 months ago
- ☆10May 17, 2022Updated 3 years ago
- Custom PDF report layouts to export ggplot2 visualizations☆11Mar 1, 2019Updated 7 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- Ethereum Smart Contract - Proof of Work token☆10Jul 2, 2017Updated 8 years ago
- Code for Auditing DPSGD☆37Feb 15, 2022Updated 4 years ago
- NIST FIPS 204 (ML-DSA) standard compliant, C++20, fully `constexpr`, header-only library☆58Feb 24, 2026Updated last week
- specs & benchmarks for the ZPrize 3 - High Throughput Signature Verification☆10Oct 9, 2023Updated 2 years ago
- Satisfy all your REST API testing needs.☆10Oct 17, 2022Updated 3 years ago
- Voter share of populist parties in recent European elections☆10Apr 29, 2019Updated 6 years ago
- Container to send ePubs to Remarkable Cloud via AWS SES, SQS, and S3.☆10May 23, 2025Updated 9 months ago
- ☆12Nov 11, 2022Updated 3 years ago
- ☆14Aug 21, 2017Updated 8 years ago
- Raycasting project.☆12Nov 19, 2023Updated 2 years ago
- An analysis of arXiv data, in terms of AI and Deep Learning research☆11Feb 19, 2021Updated 5 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- ☆12Jun 29, 2022Updated 3 years ago