chuaan / pre_examView external linksLinks
Some materials or answers of courses in UoM
☆12Nov 13, 2018Updated 7 years ago
Alternatives and similar repositories for pre_exam
Users that are interested in pre_exam are comparing it to the libraries listed below
Sorting:
- ☆14Oct 30, 2018Updated 7 years ago
- Scraper for the UoM results page which detects transcript updates and notifies the user.☆59Dec 1, 2021Updated 4 years ago
- Examples for the Spartan HPC cluster.☆10Sep 2, 2019Updated 6 years ago
- Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness. (MD attacks)☆11Aug 29, 2020Updated 5 years ago
- Implementation for ACProp ( Momentum centering and asynchronous update for adaptive gradient methdos, NeurIPS 2021)☆16Oct 11, 2021Updated 4 years ago
- The code for ACM MM2024 (Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning)☆15Jul 18, 2024Updated last year
- Evolutionary Strategies for PyTorch☆23Dec 26, 2018Updated 7 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- [ICLR 2025] BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks☆30Nov 2, 2025Updated 3 months ago
- The tutorial-material repository is prepared for Programming and Software Development COMP90041 at The University of Melbourne By Yuhao S…☆22Nov 6, 2020Updated 5 years ago
- Create realistic looking RGB images using remote sensing hyperspectral images.☆34Apr 3, 2023Updated 2 years ago
- Codes for Understanding Architectures Learnt by Cell-based Neural Architecture Search☆28Feb 6, 2020Updated 6 years ago
- Multivariate Functional Principal Component Analysis☆32Aug 29, 2025Updated 5 months ago
- Implemented multi-backbone and multi_gpu_model for YOLOv3 framework, forked from qqwwee.☆26Aug 4, 2019Updated 6 years ago
- ☆61Jan 28, 2026Updated 2 weeks ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Dec 26, 2019Updated 6 years ago
- Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"☆34Apr 28, 2020Updated 5 years ago
- Genome-wide Association Study (GWAS) Tutorial☆40Apr 12, 2019Updated 6 years ago
- Multiple Objects Counting☆34Nov 16, 2023Updated 2 years ago
- Resources (software, data, research article) in the field of statistical genetics☆41Jun 19, 2023Updated 2 years ago
- Master Slave code in mpi4py☆38Mar 30, 2019Updated 6 years ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆66Aug 7, 2025Updated 6 months ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆46Apr 16, 2019Updated 6 years ago
- Code for the paper "A Light Recipe to Train Robust Vision Transformers" [SaTML 2023]☆54Feb 6, 2023Updated 3 years ago
- This repo provides code used in the paper "Predicting with High Correlation Features" (https://arxiv.org/abs/1910.00164):☆54May 1, 2025Updated 9 months ago
- Visualizing Association Rules and Frequent Itemsets with R☆56Aug 21, 2025Updated 5 months ago
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆52Sep 18, 2018Updated 7 years ago
- PyTorch port of "Efficient Neural Architecture Search via Parameters Sharing"☆53Jun 7, 2018Updated 7 years ago
- CLEVER (Cross-Lipschitz Extreme Value for nEtwork Robustness) is a robustness metric for deep neural networks☆63Aug 3, 2021Updated 4 years ago
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆64Nov 23, 2019Updated 6 years ago
- ☆59Mar 29, 2023Updated 2 years ago
- Statistical machine learning at the University of Melbourne☆71Oct 23, 2017Updated 8 years ago
- ☆78Apr 20, 2020Updated 5 years ago
- A Closer Look at Accuracy vs. Robustness☆88May 17, 2021Updated 4 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 2 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆37Jul 22, 2024Updated last year
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆98Jun 7, 2021Updated 4 years ago
- NLNL: Negative Learning for Noisy Labels☆104Nov 14, 2019Updated 6 years ago
- Reliably download millions of images efficiently☆118Mar 8, 2021Updated 4 years ago