IVA-Xception model which can achieve high performance in identifying multiple birds from overlapping bird sounds recordings based on IVA and Xception
☆16Oct 20, 2021Updated 4 years ago
Alternatives and similar repositories for IVA-Xception
Users that are interested in IVA-Xception are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns☆10Apr 15, 2020Updated 5 years ago
- ☆17Jan 1, 2024Updated 2 years ago
- repository for paper "Audio-Visual Speech Recognition in MISP2021 Challenge: Dataset Release and Deep Analysis"☆18Jun 17, 2022Updated 3 years ago
- ☆29Jun 15, 2022Updated 3 years ago
- Simple FTP fuzzer to demonstrate boofuzz usage.☆29May 21, 2021Updated 4 years ago
- AD-TUNING: An Adaptive CHILD-TUNING Approach to Efficient Hyperparameter Optimization of Child Networks for Speech Processing Tasks in th…☆11Feb 23, 2024Updated 2 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- [Interspeech 2024] LiteFocus is a tool designed to accelerate diffusion-based TTA model, now implemented with the base model AudioLDM2.☆34Mar 11, 2025Updated last year
- ☆22Sep 28, 2022Updated 3 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Repository for the paper "Towards duration robust weakly supervised sound event detection"☆23Aug 3, 2023Updated 2 years ago
- A getattr and setattr that works on nested objects, lists, dicts, and any combination thereof without resorting to eval☆18Feb 18, 2022Updated 4 years ago
- ADAPTING SELF-SUPERVISED MODELS TO MULTI-TALKER SPEECH RECOGNITION USING SPEAKER EMBEDDINGS☆33Mar 16, 2023Updated 3 years ago
- Archive of AAA CTF 2023 (XCTF competition)☆37Nov 27, 2023Updated 2 years ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆70Aug 14, 2025Updated 7 months ago
- 🚀 🚀自动扩容的循环缓冲区实现☆38Dec 15, 2021Updated 4 years ago
- ☆25Jan 21, 2022Updated 4 years ago
- ARVO: an Atlas of Reproducible Vulnerabilities in Open source software.☆65Feb 16, 2026Updated last month
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- Public challenges from past UMDCTF competitions☆34May 3, 2025Updated 10 months ago
- Testability Pattern Catalogs for SAST☆34Feb 18, 2025Updated last year
- SEETF 2022 Public Challenge Files, Sources, and Solutions☆28Jul 27, 2022Updated 3 years ago
- CTF challenge per-team instance runner☆42Oct 30, 2025Updated 4 months ago
- INTERSPEECH2023: Target Active Speaker Detection with Audio-visual Cues☆58May 29, 2023Updated 2 years ago
- Toy LLVM obfuscator pass☆76Sep 11, 2021Updated 4 years ago
- This is official repository of new SOTA diffusion models based method for speech enhancement☆42Jul 31, 2024Updated last year
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Training data simulation☆58May 6, 2024Updated last year
- Python toolkit for speech processing☆72Updated this week
- YuraScanner☆73Feb 13, 2025Updated last year
- ☆60Jul 2, 2024Updated last year
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆69Feb 28, 2025Updated last year
- Data preparation for separation☆78Apr 20, 2021Updated 4 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆73May 24, 2022Updated 3 years ago
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆105Mar 27, 2024Updated last year
- The codebase for Data-driven general-purpose voice activity detection.☆93Aug 3, 2023Updated 2 years ago
- CHIME-7/8 diarization champion system: neural speaker diarization using memory-aware multi-speaker embedding with sequence-to-sequence ar…☆85Jun 17, 2025Updated 9 months ago
- ☆94Apr 24, 2025Updated 11 months ago