☆10Nov 8, 2021Updated 4 years ago
Alternatives and similar repositories for MIAIS
Users that are interested in MIAIS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Semantic Segmentation Network based on ResNet38☆21Mar 25, 2021Updated 5 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- ☆18Dec 31, 2023Updated 2 years ago
- Build a skeleton using Blender and register it to human mesh.☆16May 29, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- Probabilistic Jacobian-based Saliency Maps Attacks☆19Nov 28, 2020Updated 5 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- ☆53Feb 24, 2024Updated 2 years ago
- Message Queue based Interprocess Communication (IPC) between Python and C.☆23Dec 20, 2025Updated 3 months ago
- Open-source strong baseline for domain generlization re-ID. We will udpate the strong baseline and CFD method~☆10Nov 30, 2021Updated 4 years ago
- Learning a grayscale image that can be fully restored to its orignal color version.☆25Jan 18, 2022Updated 4 years ago
- Establishing Robust Generative Image Steganography via Popular Stable Diffusion☆57Dec 26, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A curated list of awesome privacy preserving machine learning resources☆14May 17, 2020Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆21Jan 15, 2020Updated 6 years ago
- HiDDeN: Hiding Data with Deep Networks.☆104Dec 12, 2018Updated 7 years ago
- Implement ResNet family from scratch and train them on CIFAR-10, Tiny ImageNet, and ImageNet datasets☆16May 21, 2019Updated 6 years ago
- Official code release for Deep Extreme Mixture Model by Wilson, McDonald, Galib, Tan, and Luo.☆10Feb 11, 2022Updated 4 years ago
- Automatically locate your eyeglass areas in video streams and apply Gaussian filters to blur it.☆27Dec 5, 2022Updated 3 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- The PyTorch implementation of our paper "Password-conditioned Anonymization and Deanonymization with Face Identity Transformers" in ECCV …☆35Mar 4, 2021Updated 5 years ago
- PyTorch implementation of 'Cover-separable Fixed Neural Network Steganography via Deep Generative Models' (ACM MM 2024)☆23Nov 17, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Implementation of 'A Watermark for Large Language Models' paper by Kirchenbauer & Geiping et. al.☆24Feb 21, 2023Updated 3 years ago
- 根据论文:"Minimum Barrier Salient Object Detection At 80 FPS"给出的matlab代码,使用c++重写的。 The c++ implementation on "Minimum Barrier Salient Object …☆10Dec 4, 2016Updated 9 years ago
- Ranking Models in Unlabeled New Environments (iccv21)☆16Aug 21, 2021Updated 4 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- Code for☆28Dec 16, 2024Updated last year
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- Learning Iterative Neural Optimizers for Image Steganography☆23Jun 24, 2025Updated 9 months ago
- ☆51Jan 17, 2023Updated 3 years ago
- Code from my research papers☆12May 12, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Official PyTorch implementation of "HiNet: Deep Image Hiding by Invertible Network" (ICCV 2021)☆204Feb 9, 2022Updated 4 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆38Feb 11, 2018Updated 8 years ago
- Differentiable color conversion functions for pytorch☆11Nov 8, 2019Updated 6 years ago
- ☆10May 14, 2023Updated 2 years ago
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 9 years ago
- BBO optimiser☆11Feb 11, 2020Updated 6 years ago
- ☆14Oct 21, 2021Updated 4 years ago