☆10May 14, 2023Updated 2 years ago
Alternatives and similar repositories for some-resources
Users that are interested in some-resources are comparing it to the libraries listed below
Sorting:
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- Guustock platform is recommended for Chinese stock traders interested in CZSC(缠中说禅) indicator series. Ruby apis will be provided based on…☆13Mar 21, 2012Updated 14 years ago
- awesome ai applications, lane line detection, license plate detection, etc.☆14Oct 12, 2020Updated 5 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- Conditional-Glow for Structured Prediction☆27Mar 5, 2023Updated 3 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22May 13, 2022Updated 3 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- ☆12Apr 26, 2024Updated last year
- ☆14Aug 8, 2023Updated 2 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- [NeurIPS '21] Adversarial Attacks on Graph Classification via Bayesian Optimisation (GRABNEL)☆14Nov 21, 2021Updated 4 years ago
- ☆26Jul 9, 2025Updated 8 months ago
- the rhg robot for ichunqiu 2018☆22Jan 17, 2019Updated 7 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆12Mar 20, 2023Updated 3 years ago
- ☆16Nov 2, 2020Updated 5 years ago
- Repository for the paper "U-Net Transplant: The Role of Pre-training for Model Merging in 3D Medical Segmentation" accepted @ MICCAI2025☆31Jun 26, 2025Updated 8 months ago
- ☆47Feb 21, 2020Updated 6 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- Offline handwritten mathematical expression recognition via stroke extraction for Android☆14Sep 7, 2020Updated 5 years ago
- Handwritten Math Expressions Recognition☆13Sep 8, 2017Updated 8 years ago
- Simplified Diffusion Schrödinger Bridge☆13Apr 19, 2024Updated last year
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- A pytorch implementation of Attention Is All You Need (Transformer) for image captioning.☆12Nov 15, 2021Updated 4 years ago
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- A python script that can transfer ckpt file to pb file☆10Oct 24, 2020Updated 5 years ago
- The official repo of paper "Self-Control of LLM Behaviors by Compressing Suffix Gradient into Prefix Controller"☆18Aug 13, 2024Updated last year
- Differentiable color conversion functions for pytorch☆11Nov 8, 2019Updated 6 years ago
- PRIS presents a large scale off-line handwritten Chinese character database-HCL2000 which will be made public available for the research …☆11Mar 19, 2024Updated 2 years ago
- ☆57Mar 24, 2023Updated 2 years ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆104Jul 8, 2021Updated 4 years ago
- Genetic algorithm tuned through reinforcement learning☆17Jul 2, 2021Updated 4 years ago
- A nicely typeset table of the 100 most common radicals in Chinese characters☆17May 2, 2021Updated 4 years ago
- BBO optimiser☆11Feb 11, 2020Updated 6 years ago