☆10May 14, 2023Updated 2 years ago
Alternatives and similar repositories for some-resources
Users that are interested in some-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- Guustock platform is recommended for Chinese stock traders interested in CZSC(缠中说禅) indicator series. Ruby apis will be provided based on…☆13Mar 21, 2012Updated 14 years ago
- awesome ai applications, lane line detection, license plate detection, etc.☆14Oct 12, 2020Updated 5 years ago
- ☆29Jun 27, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Conditional-Glow for Structured Prediction☆27Mar 5, 2023Updated 3 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22May 13, 2022Updated 3 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- ☆12Apr 26, 2024Updated 2 years ago
- ☆16Aug 8, 2023Updated 2 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- [NeurIPS '21] Adversarial Attacks on Graph Classification via Bayesian Optimisation (GRABNEL)☆14Nov 21, 2021Updated 4 years ago
- ☆28Jul 9, 2025Updated 9 months ago
- the rhg robot for ichunqiu 2018☆22Jan 17, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆12Mar 20, 2023Updated 3 years ago
- ☆16Nov 2, 2020Updated 5 years ago
- Repository for the paper "U-Net Transplant: The Role of Pre-training for Model Merging in 3D Medical Segmentation" accepted @ MICCAI2025☆31Jun 26, 2025Updated 10 months ago
- ☆47Feb 21, 2020Updated 6 years ago
- ☆14Apr 18, 2022Updated 4 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Offline handwritten mathematical expression recognition via stroke extraction for Android☆14Sep 7, 2020Updated 5 years ago
- Handwritten Math Expressions Recognition☆13Sep 8, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Simplified Diffusion Schrödinger Bridge☆15Apr 19, 2024Updated 2 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- A pytorch implementation of Attention Is All You Need (Transformer) for image captioning.☆12Nov 15, 2021Updated 4 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- A python script that can transfer ckpt file to pb file☆10Oct 24, 2020Updated 5 years ago
- The official repo of paper "Self-Control of LLM Behaviors by Compressing Suffix Gradient into Prefix Controller"☆18Aug 13, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Differentiable color conversion functions for pytorch☆11Nov 8, 2019Updated 6 years ago
- ☆57Mar 24, 2023Updated 3 years ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆105Jul 8, 2021Updated 4 years ago
- PRIS presents a large scale off-line handwritten Chinese character database-HCL2000 which will be made public available for the research …☆11Mar 19, 2024Updated 2 years ago
- Genetic algorithm tuned through reinforcement learning☆17Jul 2, 2021Updated 4 years ago
- BBO optimiser☆11Feb 11, 2020Updated 6 years ago
- code for paper TDGIA:Effective Injection Attacks on Graph Neural Networks (KDD 2021, research track)☆22Nov 5, 2021Updated 4 years ago