基于树莓派OpenCV和PyQT的人脸识别项目
☆22Jun 11, 2021Updated 4 years ago
Alternatives and similar repositories for RaspiFaceSystem
Users that are interested in RaspiFaceSystem are comparing it to the libraries listed below
Sorting:
- [IEEE JBHI 2021] The convolutional neural networks training with Channel-Selectivity for human activity recognition based on sensors☆15Jul 1, 2021Updated 4 years ago
- 《HEBUT手册》GitBook发布于https://hebutmanual.gitbook.io/hebut-manual/☆10Jun 17, 2023Updated 2 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 4 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- ☆17Mar 22, 2019Updated 6 years ago
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- API that sends a command to a SSH Server from a URL.☆12Oct 31, 2019Updated 6 years ago
- Linux一键添加SWAP☆10Apr 8, 2021Updated 4 years ago
- 极简版抖音 - 第四届字节跳动青训营Android大作业☆14Aug 21, 2022Updated 3 years ago
- eAudit suite for recording provenance-related system calls on Linux☆18Jan 16, 2026Updated last month
- [ICML'24] Conformal Prediction for Deep Classifier via Label Ranking☆13Jun 14, 2024Updated last year
- Vulnerable application for security issues demo☆17Jan 18, 2019Updated 7 years ago
- Single Master - Multi Worker K8S cluster for learning and development☆15Jul 6, 2020Updated 5 years ago
- [ICML'24] Open-Vocabulary Calibration for Fine-tuned CLIP☆18Jun 14, 2024Updated last year
- 树莓派人脸识别打卡☆15Oct 14, 2019Updated 6 years ago
- For BambooFox☆14Sep 25, 2016Updated 9 years ago
- ☆18Jun 18, 2023Updated 2 years ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆17Jul 24, 2021Updated 4 years ago
- Human Activity Recognition☆14Nov 14, 2018Updated 7 years ago
- The repository for our paper: Neighboring Perturbations of Knowledge Editing on Large Language Models☆16May 4, 2024Updated last year
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- ☆18Oct 29, 2021Updated 4 years ago
- vMFNet: Compositionality Meets Domain-generalised Segmentation☆16Aug 5, 2022Updated 3 years ago
- Hide/Block files in filesystem☆14Nov 23, 2021Updated 4 years ago
- The Overleaf LaTeX template of the bupt graduate thesis.☆31Mar 7, 2025Updated 11 months ago
- 使用BiSeNet做人脸面部解析,包含了基于pytorch, opencv, onnxruntime三种库的程序实现,并且比较了在调用三种库的输入和输出的差异☆15May 7, 2021Updated 4 years ago
- [IMWUT/UbiComp 2024] Optimization-Free Test-Time Adaptation for Cross-Person Activity Recognition☆23Oct 28, 2023Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- Kubescape eBPF agent 🥷🏻☆24Feb 27, 2026Updated last week
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆23Mar 20, 2024Updated last year
- A docker environment which could run and debug multiarch program, such as mips, arm☆18Nov 25, 2020Updated 5 years ago
- Official repository for Beyond Binary Rewards: Training LMs to Reason about Their Uncertainty☆54Aug 20, 2025Updated 6 months ago
- 基于ESP32的两轮自平衡小车☆20Nov 16, 2019Updated 6 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- Open-source AI-augmented Security Operations Center using LLMs + Multi-Agent Orchestration | Foundation-Sec-8B | Wazuh | TheHive | RAG☆60Dec 2, 2025Updated 3 months ago
- ☆90Jun 16, 2023Updated 2 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- 模型与算法,model and algorithm,开源的数学与计算机书籍☆25Dec 13, 2022Updated 3 years ago