IVA-Xception model which can achieve high performance in identifying multiple birds from overlapping bird sounds recordings based on IVA and Xception
☆16Oct 20, 2021Updated 4 years ago
Alternatives and similar repositories for IVA-Xception
Users that are interested in IVA-Xception are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns☆10Apr 15, 2020Updated 5 years ago
- ☆17Jan 1, 2024Updated 2 years ago
- repository for paper "Audio-Visual Speech Recognition in MISP2021 Challenge: Dataset Release and Deep Analysis"☆18Jun 17, 2022Updated 3 years ago
- ☆29Jun 15, 2022Updated 3 years ago
- DES 加密算法的 Python3 实现☆15May 28, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Simple FTP fuzzer to demonstrate boofuzz usage.☆29May 21, 2021Updated 4 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- AD-TUNING: An Adaptive CHILD-TUNING Approach to Efficient Hyperparameter Optimization of Child Networks for Speech Processing Tasks in th…☆11Feb 23, 2024Updated 2 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- ☆11Apr 6, 2024Updated 2 years ago
- A P2P chat application client suitable for local area network(LAN)(Windows) developed using Qt5 and C++.☆14Jan 14, 2022Updated 4 years ago
- The official implementation of NeurIPS 2021 paper: Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks☆17Jul 4, 2023Updated 2 years ago
- angr's exploration technique to perform taint analysis☆63Mar 26, 2020Updated 6 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PyTorch implementation of CorInfoMax☆23Dec 26, 2022Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Repository for the paper "Towards duration robust weakly supervised sound event detection"☆23Aug 3, 2023Updated 2 years ago
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆18May 5, 2020Updated 5 years ago
- A video-based distracted driver detection system.☆26Oct 26, 2022Updated 3 years ago
- ☆31Jan 4, 2023Updated 3 years ago
- A getattr and setattr that works on nested objects, lists, dicts, and any combination thereof without resorting to eval☆19Feb 18, 2022Updated 4 years ago
- stripo-plugin☆19Apr 6, 2026Updated last week
- Challenge infrastructure used for the DownUnderCTF competition☆25Sep 8, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ADAPTING SELF-SUPERVISED MODELS TO MULTI-TALKER SPEECH RECOGNITION USING SPEAKER EMBEDDINGS☆33Mar 16, 2023Updated 3 years ago
- Collection of self-supervised models for speaker and language recognition tasks.☆19Jan 18, 2022Updated 4 years ago
- Archive of AAA CTF 2023 (XCTF competition)☆37Nov 27, 2023Updated 2 years ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆70Aug 14, 2025Updated 8 months ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆25Nov 30, 2021Updated 4 years ago
- ARVO: an Atlas of Reproducible Vulnerabilities in Open source software.☆67Feb 16, 2026Updated last month
- Testability Pattern Catalogs for SAST☆34Feb 18, 2025Updated last year
- CTF challenge per-team instance runner☆42Oct 30, 2025Updated 5 months ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Mar 9, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- INTERSPEECH2023: Target Active Speaker Detection with Audio-visual Cues☆58May 29, 2023Updated 2 years ago
- ☆46Dec 17, 2018Updated 7 years ago
- A curated list of Vision (video/image) to Audio Generation☆105Feb 10, 2026Updated 2 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- TC39 proposal for mitigating prototype pollution☆53Aug 29, 2023Updated 2 years ago
- Security-Scenes-Feature-Engineering-Toolkit, Continuous Integration.一款安全数据特征化工具☆60May 22, 2023Updated 2 years ago
- Training data simulation☆59May 6, 2024Updated last year