guyuanjunxi / yiyuView external linksLinks
在线登录注册(android客户端+javaweb服务端+腾讯云服务器+腾讯云数据库)
☆10Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for yiyu
Users that are interested in yiyu are comparing it to the libraries listed below
Sorting:
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- MICRO 2023 Evaluation Artifact for TeAAL☆10Oct 26, 2023Updated 2 years ago
- Reactive Water by Marvelmaster for Unreal Engine 4☆10Sep 15, 2022Updated 3 years ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated last year
- ☆13Jan 1, 2018Updated 8 years ago
- ☆14Aug 18, 2025Updated 5 months ago
- SSM整合(带案例)书籍增删查改☆11Jan 21, 2020Updated 6 years ago
- ☆15Jun 4, 2024Updated last year
- ☆14Apr 18, 2025Updated 9 months ago
- Gephi tutorials for data visualisation lecture. A Network Tour of Data Science 2019 Fall semester☆12Apr 11, 2021Updated 4 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- A data backup software for Linux (UESTC, 软件开发综合实验)☆14Dec 28, 2022Updated 3 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- ☆10Jul 28, 2022Updated 3 years ago
- ☆13Jul 25, 2024Updated last year
- 光遇源代码☆16Jul 11, 2019Updated 6 years ago
- CVE-2022-22978 Spring-Security bypass Demo☆16Jun 2, 2022Updated 3 years ago
- Code for our NeurIPS 2024 paper Improved Generation of Adversarial Examples Against Safety-aligned LLMs☆12Nov 7, 2024Updated last year
- 通过分离的方式免杀火绒☆12Dec 15, 2023Updated 2 years ago
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆12Apr 6, 2023Updated 2 years ago
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated last month
- ☆27Aug 4, 2025Updated 6 months ago
- Scalable In-Memory Acceleration With Mesh: Device, Circuits, Architecture, and Algorithm☆16Oct 11, 2020Updated 5 years ago
- 毕业设计,利用WiFi实现室内定位☆14Apr 14, 2019Updated 6 years ago
- An automated scanner for CSRF vulnerabilities☆15May 26, 2011Updated 14 years ago
- Self Attention layer for Person ReID. Baseline. PyTorch.☆11Jun 23, 2019Updated 6 years ago
- ☆11Feb 14, 2022Updated 3 years ago
- ☆13Oct 30, 2022Updated 3 years ago
- two demo about spring security and jwt.☆12Aug 15, 2022Updated 3 years ago
- A Python script for plotting roofline analyses. Intel Advisor style.☆17Oct 15, 2024Updated last year
- 仿微信服务器demo☆17Oct 8, 2022Updated 3 years ago
- 【Python】腾讯云云函数配合乐心健康刷QQ、微信、支付宝步数(支持随机步数、微信QQ推送)☆10Nov 22, 2020Updated 5 years ago
- 这是一个通过给定IP范围字符串生成IP集合的工具. This is a tool for generating IP SETS from a given IP range string. support ipv4 and ipv6☆13Jun 18, 2025Updated 7 months ago
- RAML (1.0) parser implementation in golang☆14Apr 30, 2019Updated 6 years ago
- 一个简单易用,稳定高效的及时通讯框架(支持端口多开,同时支持socket与websocket消息互通)A simple and easy to use, stable and efficient timely communication framework (support…☆13Sep 19, 2024Updated last year
- Code related to ’Beyond spectral gap: The role of the topology in decentralized learning‘.☆13Jun 7, 2022Updated 3 years ago
- 整理容器逃逸相关的漏洞和exploits.☆15Apr 17, 2024Updated last year