Configurations for ZJU VPN on TP-Link WDR4310
☆15Jun 12, 2013Updated 12 years ago
Alternatives and similar repositories for OpenWrt_4310
Users that are interested in OpenWrt_4310 are comparing it to the libraries listed below
Sorting:
- Template for master thesis of ZJU CSers☆28Jan 16, 2017Updated 9 years ago
- 将浙江大学教务网课程导出为 iCalendar 文件,使用阿里云函数计算作为后端部署。☆22Sep 13, 2019Updated 6 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- Nginx PHP FastCGI Server Configuration - with Adminer☆13Feb 12, 2024Updated 2 years ago
- 3D Printed Enclosure for Adafruit Feather Boards☆12Apr 14, 2017Updated 8 years ago
- Implementation of joint bayesian model, written in python.☆11Aug 2, 2021Updated 4 years ago
- ACM@UIUC's website code (Django)☆15Oct 3, 2016Updated 9 years ago
- ☆11Mar 13, 2023Updated 2 years ago
- 1-step Q Learning from the paper "Asynchronous Methods for Deep Reinforcement Learning"☆12Mar 13, 2017Updated 8 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- 求是潮移动平台☆14Apr 8, 2013Updated 12 years ago
- ☆12Apr 22, 2024Updated last year
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- 开源博客评论灌水机器人....☆11Nov 8, 2017Updated 8 years ago
- 浙大硕士毕业论文模板☆10Mar 14, 2015Updated 10 years ago
- PHP WebSocket Server for PHP 5.3☆28Jul 29, 2012Updated 13 years ago
- Code for "Live Trojan Attacks on Deep Neural Networks" paper☆10May 8, 2020Updated 5 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- Hand Gesture Recognition-opencv☆12Jul 10, 2016Updated 9 years ago
- 🚀 Building an OpenAI-Compatible API with Open-Source LLM: Rate-Limiting, Custom API Keys 🔐, and Streamlit Authentication 🌐☆23Sep 9, 2024Updated last year
- 浙江大学计算机系2013届飞跃手册☆12May 28, 2013Updated 12 years ago
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆13Jun 22, 2023Updated 2 years ago
- fingerprint verification using convolution neural networks☆11Apr 3, 2018Updated 7 years ago
- Zeroth-order Min-max Optimization☆12Jun 28, 2020Updated 5 years ago
- PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)☆18Mar 29, 2024Updated last year
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆20Nov 10, 2025Updated 3 months ago
- [ICLR 2025 Spotlight] Weak-to-strong preference optimization: stealing reward from weak aligned model☆16Feb 24, 2025Updated last year
- A simple MiniSQL project written in C☆11Feb 22, 2017Updated 9 years ago
- Matlab offscreen rendering toolbox.☆16Feb 23, 2015Updated 11 years ago
- Distinguishing between Natural and Computer-Generated Images Using Convolutional Neural Networks☆12Jul 6, 2018Updated 7 years ago
- Venus is a state-of-the-art sound and complete verification toolkit for Relu-based feed-forward neural networks. It can be used to check…☆15Aug 31, 2022Updated 3 years ago
- A MQTT Server in Python☆28Nov 14, 2024Updated last year
- Universal Adversarial Perturbations based on the (p, q)-singular vectors.☆12Jan 8, 2018Updated 8 years ago
- runner game in chromium web browser☆14Jul 29, 2020Updated 5 years ago
- Wrapper library created to simplify use of SDS011 laser dust sensor in your projects☆17Dec 30, 2022Updated 3 years ago
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Nov 21, 2022Updated 3 years ago
- ZJUT XeLaTeX template of graduation project☆21Aug 9, 2022Updated 3 years ago