神经网络与深度学习大作业
☆20Jan 20, 2022Updated 4 years ago
Alternatives and similar repositories for CBAM-CycleGAN
Users that are interested in CBAM-CycleGAN are comparing it to the libraries listed below
Sorting:
- 一个为Gemini对话添加交互式时间轴的浏览器扩展,让长对话导航和回顾更轻松。☆76Oct 15, 2025Updated 4 months ago
- An implementation of MSSRM method☆11Mar 23, 2023Updated 2 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Aug 9, 2019Updated 6 years ago
- 💻 🐈 Added a self-attention layer to the CycleGAN implementation (PyTorch).☆13May 31, 2024Updated last year
- 宝可梦3代GBA汉字字库补丁(增益优化版)☆13Jul 15, 2024Updated last year
- An implementaion of PyTorch UNet segmentation model on VOC2012 dataset☆10Mar 1, 2023Updated 3 years ago
- 可用于《宝可梦》第四世代汉化修正版的 PKHeX 版本☆12Jul 19, 2025Updated 7 months ago
- ☆14Apr 11, 2018Updated 7 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- Dataset for GAN-Generated Images Detection☆10Apr 25, 2024Updated last year
- PokeClassic is a romhack inspired by Pokemon Yellow, using the Pokemon Emerald Engine. This romhack was originally made by danenders. Thi…☆20Feb 27, 2026Updated last week
- Demo code for the paper: One Thing to Fool them All: Generating Interpretable, Universal, and Physically-Realizable Adversarial Features☆12Nov 30, 2023Updated 2 years ago
- ☆15Feb 26, 2023Updated 3 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- Official code for "Continual Learning in the Frequency Domain" (NeurIPS 2024)☆13Mar 18, 2025Updated 11 months ago
- ☆15Dec 19, 2022Updated 3 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Aug 3, 2022Updated 3 years ago
- Official PyTorch Implementaion of Generative Perturbation Network for Signal-Agnostic/Specific Adversarial Attacks on EEG-based Brain-Com…☆16Dec 6, 2022Updated 3 years ago
- ☆18Mar 20, 2023Updated 2 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Source code for *Weakly Supervised Histopathology Image Segmentation with Sparse Point Annotations*.☆15Jul 8, 2021Updated 4 years ago
- ☆14Jun 27, 2023Updated 2 years ago
- Exploring Negatives in Contrastive Learning for Unpaired Image-to-Image Translation☆14Mar 16, 2023Updated 2 years ago
- ☆19Sep 11, 2024Updated last year
- Unpaired Image Translation for Neutrino Experiements☆22Jul 21, 2023Updated 2 years ago
- ☆18Sep 11, 2021Updated 4 years ago
- unformal implementation of advdiffuser☆17Feb 4, 2024Updated 2 years ago
- Domain Adaptive Mitochondria Segmentation via Enforcing Inter-Section Consistency☆16Jul 16, 2023Updated 2 years ago
- ☆19Oct 28, 2022Updated 3 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- ☆18Jun 2, 2023Updated 2 years ago
- ☆18Jan 12, 2022Updated 4 years ago
- ☆21Jun 17, 2024Updated last year
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆17Jul 19, 2022Updated 3 years ago
- Public repository for "DCT-Former: Efficient Self-Attention withDiscrete Cosine Transform"☆18Mar 15, 2023Updated 2 years ago
- ☆18Mar 24, 2023Updated 2 years ago
- unet base on convnext aritecture☆15Jun 3, 2022Updated 3 years ago
- official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Att…☆20Oct 28, 2022Updated 3 years ago
- Code for DCT_SNN, an input encoding scheme for SNNs using DCT☆20Sep 30, 2021Updated 4 years ago