katywarr / strengthening-dnnsView external linksLinks
Code repository to accompany the O'Reilly book: "Strengthening Deep Neural Networks: Making AI Less Susceptible to Adversarial Trickery"
☆57Jun 29, 2020Updated 5 years ago
Alternatives and similar repositories for strengthening-dnns
Users that are interested in strengthening-dnns are comparing it to the libraries listed below
Sorting:
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- ☆34Feb 28, 2017Updated 8 years ago
- Code for the CVPR 2021 paper: Understanding Failures of Deep Networks via Robust Feature Extraction☆36May 29, 2022Updated 3 years ago
- This is a repository of personal studies on "storytelling with data".☆16Jan 28, 2021Updated 5 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Dec 9, 2024Updated last year
- ☆11Oct 30, 2023Updated 2 years ago
- This project is the official implementation of "Local and Global Logit Adjustments for Long-Tailed Learning", ICCV 2023☆12Feb 19, 2024Updated last year
- Utilities for easy use of custom losses in CatBoost, LightGBM, XGBoost.☆10Feb 9, 2026Updated last week
- Incorporate Image, Text and Tabular Data with HuggingFace Transformers☆12Mar 1, 2022Updated 3 years ago
- Multimodal data loader compatible with pytorch and tensorflow☆12Aug 14, 2024Updated last year
- ☆12Jul 28, 2020Updated 5 years ago
- A data processing module implemented with numpy☆10Aug 16, 2022Updated 3 years ago
- ☆13Jan 13, 2025Updated last year
- synchronous and asynchronous event based c++ executor libray☆13Sep 25, 2016Updated 9 years ago
- 面向对象学习小项目,学生信息管理系统☆10Oct 6, 2019Updated 6 years ago
- Solve ciphers with python☆10Oct 24, 2018Updated 7 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- Implementation of "Conditional Score Guidance for Text-Driven Image-to-Image Translation" (NeurIPS 2023).☆11Jul 19, 2023Updated 2 years ago
- ICM-Assistant: Instruction-tuning Multimodal Large Language Models for Rule-based Explainable Image Content Moderation. AAAI, 2025☆13Aug 25, 2025Updated 5 months ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- ☆16Oct 2, 2022Updated 3 years ago
- privacy☆12Nov 30, 2018Updated 7 years ago
- Predicting treatment effects from RCTs (Circulation: CQO 2019).☆10Jun 21, 2022Updated 3 years ago
- Pytorch package for geometric softmax☆12Jun 13, 2019Updated 6 years ago
- Build a Node.js chatbot that uses Watson Assistant search skill to query an owner's manual☆11Sep 17, 2025Updated 4 months ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- Solution for N+1 fish, N+2 fish DrivenData competition (2nd place)☆13Sep 12, 2019Updated 6 years ago
- ☆13Apr 2, 2018Updated 7 years ago
- ☆13May 8, 2023Updated 2 years ago
- ☆17Dec 16, 2025Updated 2 months ago
- AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)☆46Oct 19, 2020Updated 5 years ago
- Data Backend server that uses eBPF to monitor network connections and provide real-time network analytics.☆18Aug 14, 2025Updated 6 months ago
- Tensorflow binaries and Docker images compiled with GPU support and CPU optimizations.☆14Jul 30, 2019Updated 6 years ago
- Official implementation of "Video-Foley: Two-Stage Video-To-Sound Generation via Temporal Event Condition For Foley Sound". IEEE TASLP 20…☆16Sep 29, 2025Updated 4 months ago
- Kaggling Home Credit Default Risk in a pipeline fashion.☆12Sep 20, 2018Updated 7 years ago
- a sample REST API in Django and Python for employees. Supports GET, POST, PUT, DEL☆10Aug 22, 2018Updated 7 years ago
- Tutorials, Examples about Kubeflow Pipeline.☆13Nov 21, 2022Updated 3 years ago
- A python package to extract information from MIDI files☆13Aug 30, 2023Updated 2 years ago