在线目标识别系统
☆23Mar 2, 2020Updated 6 years ago
Alternatives and similar repositories for Online-Object-Detection
Users that are interested in Online-Object-Detection are comparing it to the libraries listed below
Sorting:
- 基于yolov5和django框架的web端人脸识别并打码系统☆10Aug 11, 2023Updated 2 years ago
- 示范faster-RCNN-pytorch如何生成20000个anchor box及可视化最终的图像☆13Jul 6, 2019Updated 6 years ago
- We present the Automatic Helmet Detection System, a CNN model trained on image dataset that can detect motorbikes as well as riders weari…☆14Mar 28, 2022Updated 3 years ago
- ☆13Jul 2, 2025Updated 8 months ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆21Nov 10, 2025Updated 4 months ago
- ☆16Jun 10, 2025Updated 9 months ago
- A program that tracks the ball and estimates the shot location of a basketball shot.☆11May 21, 2019Updated 6 years ago
- ☆16Nov 8, 2024Updated last year
- Note: DO NOT USE IT! THIS CODE IS PROVEN TO CONTAIN DATA LEAKAGE! Archive version of "Text Is MASS: Modeling as Stochastic Embedding for …☆22May 1, 2025Updated 10 months ago
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- Code for the paper "Unbiased Supervised Contrastive Learning" | ICLR 2023 https://openreview.net/forum?id=Ph5cJSfD2XN☆13Sep 22, 2023Updated 2 years ago
- Inception V3 & Bilinear CNN tensorflow code for CUB-200-2011 Birds Dataset.☆14Oct 17, 2020Updated 5 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- Working Memory Attack on LLMs☆17May 27, 2025Updated 9 months ago
- Fine-Tune LLM Synthetic-Data application and "From Data to AGI: Unlocking the Secrets of Large Language Model"☆16Jul 5, 2024Updated last year
- ☆18Mar 24, 2023Updated 2 years ago
- ☆23Jan 17, 2025Updated last year
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- Simple MLP for representing the SDF of a single shape☆17Jun 30, 2023Updated 2 years ago
- Experimental Code for Private Decision Tree Evaluation☆16Sep 12, 2023Updated 2 years ago
- The source code used for paper "TELEClass: Taxonomy Enrichment and LLM-Enhanced Hierarchical Text Classification with Minimal Supervision…☆25Apr 6, 2025Updated 11 months ago
- Official Code for "Learning to Reason via Mixture-of-Thought for Logical Reasoning"☆28Nov 20, 2025Updated 4 months ago
- [NeurIPS 2023] LMC: Large Model Collaboration with Cross-assessment for Training-Free Open-Set Object Recognition☆19May 26, 2024Updated last year
- ☆23Apr 9, 2024Updated last year
- code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"☆20Oct 19, 2023Updated 2 years ago
- Tensorflow implementation of Our APE-GAN☆23Apr 24, 2018Updated 7 years ago
- ☆17Nov 1, 2024Updated last year
- 该项目实现了隐私保护和可验证的卷积神经网络(CNN)测试,旨在使模型开发者能够在多个测试者提供的非公开数据上向用户证明CNN性能的真实性,同时保护模型和数据的隐私。☆17Oct 23, 2023Updated 2 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago
- A PyTorch Implementation of the UAP attack☆19Dec 31, 2018Updated 7 years ago
- Tensorflow code for Sparse Adversarial Perturbations for Videos☆23Mar 8, 2019Updated 7 years ago
- KV Cache Steering for Inducing Reasoning in Small Language Models☆46Jul 24, 2025Updated 7 months ago
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 3 years ago
- Cerebro: A platform for Secure Coopetitive Learning☆24Sep 9, 2021Updated 4 years ago
- Code and dataset for the paper: "Can Editing LLMs Inject Harm?"☆21Dec 26, 2025Updated 2 months ago
- 💍☆26Feb 3, 2025Updated last year
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆27Jul 6, 2024Updated last year
- The data explorer of JD Chain is a web front page project,which is serving by gateway.☆22Feb 27, 2023Updated 3 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆27Nov 13, 2018Updated 7 years ago