Create virtual machine on a server from docker(support deep learning)
☆13Sep 14, 2020Updated 5 years ago
Alternatives and similar repositories for lab_vm
Users that are interested in lab_vm are comparing it to the libraries listed below
Sorting:
- Official Code for Scaling Adversarial Training to Large Perturbation Bounds (ECCV-2022)☆11Nov 25, 2022Updated 3 years ago
- Official code for "TWINS: A Fine-Tuning Framework for Improved Transferability of Adversarial Robustness and Generalization", CVPR 2023☆13Apr 26, 2023Updated 2 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- Code for CVPR 2022 paper "APES: Articulated Part Extraction from Sprite Sheets"☆22Aug 8, 2025Updated 6 months ago
- ☆22Apr 15, 2022Updated 3 years ago
- ☆20Mar 14, 2025Updated 11 months ago
- ControlText: Unlocking Controllable Fonts in Multilingual Text Rendering without Font Annotations☆33Apr 3, 2025Updated 11 months ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆27Dec 23, 2020Updated 5 years ago
- "User-Guided Line Art Flat Filling with Split Filling Mechanism" in CVPR 2021☆27Mar 19, 2021Updated 4 years ago
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆28Nov 25, 2022Updated 3 years ago
- ☆28May 7, 2019Updated 6 years ago
- Fine-tuning an already learned model, adapts the architecture to other datasets☆27Oct 18, 2017Updated 8 years ago
- FudanOCR: A modularized and extensible OCR framework for text detection and recognition. The model group contains CRNN, MORAN, EAST and s…☆10Dec 8, 2022Updated 3 years ago
- Code for the paper Boosting Accuracy and Robustness of Student Models via Adaptive Adversarial Distillation (CVPR 2023).☆34May 26, 2023Updated 2 years ago
- A modified implementation of Synthesizing Programs for Images using Reinforced Adversarial Learning (SPIRAL) using ChainerRL.☆24Jun 8, 2021Updated 4 years ago
- [ICLR 2022]: Fast AdvProp☆35Mar 21, 2022Updated 3 years ago
- A curated list of resources dedicated to Face Recognition & Detection, OCR, Objection Detection, Gan, 3D, Motion Track & Pose Estimation,…☆26Jul 9, 2019Updated 6 years ago
- Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs. Robustness Trade-off☆33Apr 28, 2022Updated 3 years ago
- ☆36Dec 22, 2022Updated 3 years ago
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆37Aug 17, 2020Updated 5 years ago
- "Generating Manga from Illustrations via Mimicking Manga Creation Workflow" in CVPR 2021☆45Jul 28, 2021Updated 4 years ago
- 表格解析资源综述☆43Aug 2, 2021Updated 4 years ago
- A code repository associated with the paper A Benchmark for Rough Sketch Cleanup by Chuan Yan, David Vanderhaeghe, and Yotam Gingold from…☆45Mar 8, 2021Updated 4 years ago
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆45Aug 29, 2021Updated 4 years ago
- ☆44May 8, 2020Updated 5 years ago
- [ICLR 2021] "Robust Overfitting may be mitigated by properly learned smoothening" by Tianlong Chen*, Zhenyu Zhang*, Sijia Liu, Shiyu Chan…☆49Dec 30, 2021Updated 4 years ago
- Implementation of "JOKR: Joint Keypoint Representation for Unsupervised Cross-Domain Motion Retargeting"☆52Dec 11, 2021Updated 4 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- Code for paper "SketchyCOCO: Image Generation from Freehand Scene Sketches" (CVPR 2020)☆49Mar 24, 2023Updated 2 years ago
- Pytorch implementation of Deep Recursive Residual Network for Super Resolution (DRRN), CVPR 2017☆196Jun 20, 2018Updated 7 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Nov 17, 2022Updated 3 years ago
- ☆58Jul 27, 2022Updated 3 years ago
- a neural network that draws digits using strokes☆53Dec 6, 2022Updated 3 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆64Jan 14, 2020Updated 6 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆59Jan 31, 2020Updated 6 years ago
- Radical Analysis Network for Learning Hierarchies of Chinese Characters☆56Jun 17, 2020Updated 5 years ago
- Implementation of MDP: A Generalized Framework for Text-Guided Image Editing by Manipulating the Diffusion Path☆67Jun 23, 2023Updated 2 years ago