IVA-Xception model which can achieve high performance in identifying multiple birds from overlapping bird sounds recordings based on IVA and Xception
☆16Oct 20, 2021Updated 4 years ago
Alternatives and similar repositories for IVA-Xception
Users that are interested in IVA-Xception are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns☆10Apr 15, 2020Updated 6 years ago
- AD-TUNING: An Adaptive CHILD-TUNING Approach to Efficient Hyperparameter Optimization of Child Networks for Speech Processing Tasks in th…☆11Feb 23, 2024Updated 2 years ago
- A P2P chat application client suitable for local area network(LAN)(Windows) developed using Qt5 and C++.☆14Jan 14, 2022Updated 4 years ago
- angr's exploration technique to perform taint analysis☆62Mar 26, 2020Updated 6 years ago
- 四川大学教务系统chrome插件☆11Sep 19, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is a toolKit/template project for web application/server with Gin, packed common services.☆17Jan 7, 2022Updated 4 years ago
- scu anonymous forum☆13Apr 14, 2021Updated 5 years ago
- A getattr and setattr that works on nested objects, lists, dicts, and any combination thereof without resorting to eval☆18Feb 18, 2022Updated 4 years ago
- ADAPTING SELF-SUPERVISED MODELS TO MULTI-TALKER SPEECH RECOGNITION USING SPEAKER EMBEDDINGS☆33Mar 16, 2023Updated 3 years ago
- Collection of self-supervised models for speaker and language recognition tasks.☆19Jan 18, 2022Updated 4 years ago
- A C++ implementation of RAFT consensus algorithm☆21Dec 21, 2019Updated 6 years ago
- Toolkit for training and evaluating Self-Supervised Learning (SSL) frameworks for Speaker Verification (SV).☆37Feb 12, 2026Updated 2 months ago
- 第三代树洞加密算法概述☆32Mar 28, 2022Updated 4 years ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆70Apr 27, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆23Apr 7, 2022Updated 4 years ago
- distributed kv store☆42May 22, 2022Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆40Aug 2, 2022Updated 3 years ago
- SEETF 2022 Public Challenge Files, Sources, and Solutions☆28Jul 27, 2022Updated 3 years ago
- ☆39Jun 23, 2025Updated 10 months ago
- INTERSPEECH2023: Target Active Speaker Detection with Audio-visual Cues☆59May 29, 2023Updated 2 years ago
- Implement Decoupled Neural Interfaces using Synthetic Gradients in Pytorch☆120Oct 19, 2017Updated 8 years ago
- 平时cf和洛谷做题的题解以及学习算法的笔记☆45Jul 25, 2022Updated 3 years ago
- Training data simulation☆59May 6, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Paper list of Adversarial Examples☆51Oct 12, 2023Updated 2 years ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨☆46Jul 18, 2024Updated last year
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆57Oct 25, 2023Updated 2 years ago
- TheHulk is a dynamic analysis tool designed to detect and exploit DOM Clobbering vulnerabilities.☆92Aug 25, 2025Updated 8 months ago
- Python toolkit for speech processing☆72Apr 22, 2026Updated last week
- Implementation of Attack Agnostic Dataset: Towards Generalization and Stabilization of Audio DeepFake Detection paper☆61Aug 15, 2023Updated 2 years ago
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆69Feb 28, 2025Updated last year
- A pytorch implementation of the paper "ANSD-MA-MSE: Adaptive Neural Speaker Diarization Using Memory-Aware Multi-Speaker Embedding"☆62Sep 19, 2024Updated last year
- 基于协程和事件循环的c++网络库☆63Dec 20, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CHIME-7/8 diarization champion system: neural speaker diarization using memory-aware multi-speaker embedding with sequence-to-sequence ar…☆85Jun 17, 2025Updated 10 months ago
- ☆95Apr 24, 2025Updated last year
- Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js☆74Jan 21, 2024Updated 2 years ago
- Augmentation adversarial training for self-supervised speaker recognition☆77Aug 15, 2021Updated 4 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆152Jan 25, 2021Updated 5 years ago
- ICASSP 2022: 'Self-supervised Speaker Recognition with Loss-gated Learning'☆92May 29, 2023Updated 2 years ago
- ⚔️ Blades: A Unified Benchmark Suite for Attacks and Defenses in Federated Learning☆156Feb 16, 2025Updated last year