LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful toolkit to assess deep neural networks and to extend the adversarial training approaches towards improving the sustainability of model layers via layer monitoring and analysis.
☆18Mar 22, 2022Updated 4 years ago
Alternatives and similar repositories for LSA
Users that are interested in LSA are comparing it to the libraries listed below
Sorting:
- Voxtral is a state-of-the-art model developed to handle both speech transcription and audio understanding with remarkable accuracy and ef…☆29Jul 26, 2025Updated 7 months ago
- A Dimension reduction case resolution with the help of PCA and t-SNE☆11Aug 13, 2019Updated 6 years ago
- Simple Telegram bot to annotate and varify automatic speech recognition datasets☆12Mar 30, 2021Updated 4 years ago
- Adversarially Learned One-Class Classifier for Novelty Detection (ALOCC)☆225Jan 15, 2021Updated 5 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- Resources for starting the Machine learning and Deep learning.☆10Dec 29, 2020Updated 5 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- ICLR 2023 paper "Exploring and Exploiting Decision Boundary Dynamics for Adversarial Robustness" by Yuancheng Xu, Yanchao Sun, Micah Gold…☆25May 2, 2023Updated 2 years ago
- Official PyTorch implementation of our paper "Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World A…☆11Feb 8, 2023Updated 3 years ago
- 包含:1.GprMax批量仿真;2.机器学习自动识别雷达图像☆10Feb 22, 2022Updated 4 years ago
- Official Code For Dual Grained Quantization: Efficient Fine-Grained Quantization for LLM☆14Dec 27, 2023Updated 2 years ago
- ①每天定时给多个女友发给微信暖心话 ②借助图灵实现自动回复. 避免长时间不回复女友,家庭暴力很危险呀☆29Jan 4, 2021Updated 5 years ago
- A JMeter plug-in that enables you to send test results to a Kafka server☆32May 20, 2022Updated 3 years ago
- An FL algorithm inspired by FedGMA☆11Oct 21, 2023Updated 2 years ago
- Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem☆20Oct 27, 2021Updated 4 years ago
- [TPAMI 2023] Low Dimensional Landscape Hypothesis is True: DNNs can be Trained in Tiny Subspaces☆43Jun 29, 2022Updated 3 years ago
- [ICML 2021] "Double-Win Quant: Aggressively Winning Robustness of Quantized DeepNeural Networks via Random Precision Training and Inferen…☆16Feb 13, 2022Updated 4 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Official Implementation for PlugIn Inversion☆16Oct 23, 2021Updated 4 years ago
- ☆20Jan 15, 2024Updated 2 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Jun 27, 2022Updated 3 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 3 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- Free Persian Word Level OCR Dataset☆24Aug 1, 2020Updated 5 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆52Jul 6, 2022Updated 3 years ago
- Pytorch implementation on PennAction (LSTM_Pose_Machines_CVPR_2018_paper)☆11Jun 12, 2020Updated 5 years ago
- [AAAI 2023 Oral] Peeling the Onion: Hierarchical Reduction of Data Redundancy for Efficient Vision Transformer Training☆14Apr 19, 2023Updated 2 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- ☆15Jun 22, 2020Updated 5 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- Adversarially Robust Transfer Learning with LWF loss applied to the deep feature representation (penultimate) layer☆19Feb 9, 2020Updated 6 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- HSTGODE code☆11Nov 26, 2023Updated 2 years ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆32Dec 8, 2022Updated 3 years ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- All codes in the book "Data Structures and Algorithm Analysis in C (2nd Edition) (Mark Allen Weiss)"☆20Mar 4, 2022Updated 4 years ago