Vanilla, Convolutional, VAE, Conditional VAE
☆20Dec 20, 2018Updated 7 years ago
Alternatives and similar repositories for PyTorch-Autoencoders
Users that are interested in PyTorch-Autoencoders are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆20Updated this week
- A Comprehensive and Versatile Open-Source Federated Learning Framework☆33Apr 3, 2023Updated 2 years ago
- Optimisation of wastewater treatment strategies based on mixed integer linear programming☆11Jul 16, 2020Updated 5 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- ☆27Sep 15, 2024Updated last year
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆37Apr 19, 2023Updated 2 years ago
- Pytorch Datasets for Easy-To-Hard☆29Jan 9, 2025Updated last year
- The good practice in the VQA system such as pos-tag attention, structed triplet learning and triplet attention is very general and can be…☆19Jan 23, 2018Updated 8 years ago
- Adapt Newson and Krumm's classic 2009 paper, "Hidden Markov Map Matching Through Noise and Sparseness," for particle filters.☆12Apr 11, 2020Updated 5 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Dec 2, 2020Updated 5 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- ☆20Sep 13, 2021Updated 4 years ago
- Adapting the "Radioactive Data" paper to work for text models☆12Dec 23, 2020Updated 5 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- ☆10Dec 4, 2019Updated 6 years ago
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- KDD Cup 2018 of Fresh Air☆15May 30, 2018Updated 7 years ago
- Crowdsourcing metrics and test datasets beyond ImageNet (ICML 2022 workshop)☆38May 16, 2024Updated last year
- From Gradient Leakage to Adversarial Attacks in Federated Learning☆16Sep 21, 2021Updated 4 years ago
- ☆15Jun 30, 2023Updated 2 years ago
- Simple object classification project with deep-learning. We choose CIFAR10, CIFAR100 and Caltech101 as training datasets.☆15Jun 22, 2017Updated 8 years ago
- This repository contains tools for visualization of keypoint matches over two images (ORB, SIFT, LIFT, SuperPoint, D2-Net).☆12Jul 23, 2019Updated 6 years ago
- Implicit Game-Theoretic MPC☆21Feb 28, 2025Updated last year
- ☆10Aug 19, 2023Updated 2 years ago
- This is the code for reproducing the TABBIE baseline in our paper: "Retrieval-Based Transformer for Table Augmentation"☆12Sep 17, 2025Updated 6 months ago
- Official implementation of "Towards Good Practices for Efficiently Annotating Large-Scale Image Classification Datasets" (CVPR2021)☆55Oct 7, 2021Updated 4 years ago
- Deep Learning Resources, Practices☆20Nov 22, 2022Updated 3 years ago
- ☆19Mar 26, 2022Updated 3 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆34Mar 16, 2022Updated 4 years ago
- ☆22Dec 6, 2020Updated 5 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Feb 15, 2022Updated 4 years ago
- Simple Code Implementation of "Xception" architecture using PyTorch.☆16Mar 16, 2020Updated 6 years ago
- Supplementary code for the paper "UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Lear…☆14Nov 10, 2022Updated 3 years ago
- ☆19Mar 5, 2018Updated 8 years ago
- ☆20Mar 14, 2022Updated 4 years ago
- ☆20Aug 7, 2023Updated 2 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago