No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))
☆11Oct 27, 2020Updated 5 years ago
Alternatives and similar repositories for Non-targeted-Attack-IJCAI2019-ColdRiver
Users that are interested in Non-targeted-Attack-IJCAI2019-ColdRiver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Simple But High-accuracy LSTM for human Action Recognition☆20May 14, 2019Updated 6 years ago
- Dynamic, ORB-SLAM, MaskRCNN☆16Jun 7, 2020Updated 5 years ago
- Recursive Neural Tensor Networks☆11Feb 3, 2014Updated 12 years ago
- Combines the SSL Method MixMatch with a pre-trained model (EfficientNet) on a chest x-ray dataset.☆11Jun 22, 2019Updated 6 years ago
- Tutorial about noisy labels for SIBGRAPI 2020☆11Nov 6, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- Theano-based Deep Learning library (convnets, recurrent neural networks, and more).☆14Aug 2, 2017Updated 8 years ago
- Deep Learning for NLP☆12Dec 7, 2022Updated 3 years ago
- A fork of COIN's VRPH☆11Dec 12, 2017Updated 8 years ago
- A tool for generating ReID datasets in GTA V.☆13Jan 15, 2021Updated 5 years ago
- 2019 年第十六届中国研究生数学建模竞赛 A 题(华为赛题)☆14Sep 27, 2019Updated 6 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Aug 23, 2023Updated 2 years ago
- A high level tensorflow lib which can convert defined tf model to caffe and other engine☆24Jul 8, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- 模拟登录的Java爬虫实现☆12Aug 6, 2016Updated 9 years ago
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- Some machine learning algorithms implemented in python.☆11Mar 23, 2019Updated 7 years ago
- Pytorch implement of interp 2d (Perform serve as griddata in scipy)☆13Aug 24, 2019Updated 6 years ago
- Vehicle Routing Problems (VRP), Solution with Genetic Algorithms on Java☆13Jan 29, 2017Updated 9 years ago
- CAAD 2018 winning submissions☆34Feb 10, 2019Updated 7 years ago
- Deployment instructions to get a GPU VM for the Deep Learning class☆19Jun 26, 2018Updated 7 years ago
- Traffic Video Event Retrieval via Text Query using Vehicle Appearance and Motion Attributes☆10Jun 21, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Oct 20, 2023Updated 2 years ago
- Implementation of branch-and-bound for TSP in C++☆13Aug 16, 2017Updated 8 years ago
- Person Re-identification☆16Dec 18, 2018Updated 7 years ago
- Network Attached Storage (NAS) Box using Raspberry Pi allows you to install comprehensive applications and services on your Raspberry Pi,…☆22Oct 28, 2017Updated 8 years ago
- [AAAI2026] ImagerySearch: Adaptive Test-Time Search for Video Generation Beyond Semantic Dependency Constraints☆56Oct 23, 2025Updated 5 months ago
- Million Song Dataset Challenge☆21Apr 26, 2012Updated 13 years ago
- ☆17Sep 25, 2019Updated 6 years ago
- The Traveling Salesman Problem with Pickups, Deliveries and Draft Limits☆17Feb 24, 2023Updated 3 years ago
- Iris Recognition on CASIA Iris Image Database☆11Jun 4, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆22Mar 18, 2020Updated 6 years ago
- (SaGe) Semantic-Aware Generation for Self-Supervised Visual Representation Learning☆26Mar 29, 2022Updated 4 years ago
- My implementation of Spectral-Feature-Transformation-ReID, link to the paper: https://arxiv.org/abs/1811.11405☆21Mar 30, 2019Updated 7 years ago
- Topic models for review mining☆19Feb 18, 2017Updated 9 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- [EMNLP25] Official code for "POSITION BIAS MITIGATES POSITION BIAS: Mitigate Position Bias Through Inter-Position Knowledge Distillation…☆25Nov 11, 2025Updated 4 months ago
- Recursive Neural Tensor Network -- numpy-only version☆16Apr 27, 2016Updated 9 years ago