cuge1995 / IT-Defense
Our code for paper 'The art of defense: letting networks fool the attacker', IEEE Transactions on Information Forensics and Security, 2023
☆10Updated last year
Alternatives and similar repositories for IT-Defense
Users that are interested in IT-Defense are comparing it to the libraries listed below
Sorting:
- [AISTATS2021] Official implementation of "Sample Elicitation"☆29Updated 4 years ago
- ☆33Updated 4 months ago
- [ICLR2021] Official Pytorch implementation of "When Optimizing f-Divergence is Robust with Label noise"☆67Updated 2 years ago
- A framework for implementing federated learning☆31Updated 4 years ago
- ☆41Updated 2 years ago
- ASK-Attack and ASK-Defense☆42Updated 2 years ago
- CATA stroage. Design based on Flow Blockchain, with fast, secure, and developer-friendly feature. Support the next generation of games, a…☆21Updated 2 years ago
- Deep Learning - Robustness - Immune System☆13Updated 3 years ago
- PyTorch Implementation of ECCV 2022 paper: "DuelGAN: A Duel Between Two Discriminators Stabilizes the GAN Training".☆39Updated 2 years ago
- deep 3d reconstruction☆25Updated last year
- [ICLR 2023] Official Tensorflow implementation of "Distributionally Robust Post-hoc Classifiers under Prior Shifts"☆34Updated last year
- [TPAMI] Locating and Counting Heads in Crowds With a Depth Prior☆22Updated 2 years ago
- A Pytorch implementation of ICML 2022 paper "NP-Match: When Neural Processes meet Semi-Supervised Learning"☆98Updated last year
- TransRefer3D: Entity-and-Relation Aware Transformer for Fine-Grained 3D Visual Grounding [ACM MM'21]☆23Updated 3 years ago
- BAL: Balancing Diversity and Novelty for Active Learning - Official Pytorch Implementation☆38Updated last year
- Pytorch implement of the paper "VLDeformer: Vision Language Decomposed Transformer for Fast Cross-modal Retrieval", KBS 2022☆21Updated 2 years ago
- Model-Pivot is a model conversion and visualization tool to help users inter-operate among different deep learning frameworks. Convert mo…☆19Updated 3 years ago
- ☆29Updated 2 years ago
- MAPLE: Masked Pseudo-Labeling autoEncoder for Semi-supervised Point Cloud Action Recognition.☆34Updated last year
- When doing audio and video sentiment recognition, I found that a lot of code is duplicated, often a function in different time debugging …☆31Updated 4 years ago
- Optimisation of wastewater treatment strategies based on mixed integer linear programming☆11Updated 4 years ago
- A PyTorch implementation for Temporal Textual Localization in Video via Adversarial Bi-Directional Interaction Networks☆38Updated 4 years ago
- CVPR 2022 Workshop Robust Classification☆78Updated 2 years ago
- A wearable, a necklace-like medical device using Alpha Wave sound therapy to treat depression in dogs☆17Updated last year
- python工具库,助你快人一步 ✌ #渗透测试 #网络安全☆17Updated 3 years ago
- The implementation of the paper: FARP-Net: Local-Global Feature Aggregation and Relation-Aware Proposals for 3D Object Detection.☆27Updated last year
- This is the source code for paper "Unsupervised Adversarial Domain Adaptation for Cross-domain Face Presentation Attack Detection"☆78Updated 3 years ago
- Web3 Ethereum WebApp as the entrance for users entering the magic of Ethereum Network☆7Updated 3 years ago
- Simple Pytorch implementations of most used Generative Adversarial Network (GAN) varieties.☆84Updated 6 years ago
- Generative Exploration and Exploitation☆25Updated 3 years ago