A curated list of the top 10 computer vision papers in 2021 with video demos, articles, code and paper reference.
☆129Jan 28, 2022Updated 4 years ago
Alternatives and similar repositories for top-10-cv-papers-2021
Users that are interested in top-10-cv-papers-2021 are comparing it to the libraries listed below
Sorting:
- A curated list of the latest breakthroughs in AI (in 2021) by release date with a clear video explanation, link to a more in-depth artic…☆2,909Oct 18, 2023Updated 2 years ago
- A list of the top 10 computer vision papers in 2020 with video demos, articles, code and paper reference.☆193Jan 28, 2022Updated 4 years ago
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- Draw in the air ! with opencv and a webcam☆17Apr 4, 2019Updated 6 years ago
- A Numpy implementation of a Generative Adversarial Network.☆17Sep 4, 2020Updated 5 years ago
- ☆41Apr 29, 2024Updated last year
- Research code of Cycle Generative Adversarial Networks for Complementary Item Recommendations.☆21Mar 9, 2023Updated 3 years ago
- Essential Guide to keep up with AI/ML/DL/CV☆20Aug 30, 2021Updated 4 years ago
- Pytorch implementation for Lightweight Generative Adversarial Networks for Text-Guided Image Manipulation.☆18Jan 4, 2022Updated 4 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- draw something using CSS3☆22Nov 7, 2022Updated 3 years ago
- ☆31Aug 21, 2023Updated 2 years ago
- ☆24Apr 14, 2019Updated 6 years ago
- This repository was created as an implementation approach for a project on "Watermarking Deep Neural Networks".☆29Nov 16, 2020Updated 5 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- A curated list of the latest breakthroughs in AI (in 2022) by release date with a clear video explanation, link to a more in-depth articl…☆3,186Oct 18, 2023Updated 2 years ago
- ☆27Sep 8, 2021Updated 4 years ago
- This repository collects the latest research progress of Privacy-Preserving Recommender Systems after 2018.☆30Nov 4, 2021Updated 4 years ago
- Books for ML and Data Science☆29Oct 11, 2019Updated 6 years ago
- Time Series Analysis and Its Applications, Ed 5☆20Dec 17, 2025Updated 2 months ago
- Commonality in Natural Images Rescues GANs: Pretraining GANs with Generic and Privacy-free Synthetic Data - Official PyTorch Implementati…☆34Nov 14, 2022Updated 3 years ago
- Python syntax generator based on Object-Oriented Programing, type hints, and simplicity☆10Sep 26, 2021Updated 4 years ago
- ☆10Mar 22, 2020Updated 5 years ago
- A to Z of ML☆38Jan 14, 2023Updated 3 years ago
- This is the code of ICLR 2022 Oral paper 'Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Au…☆30Oct 22, 2023Updated 2 years ago
- Homework for STAT 205A - Berkeley☆13Dec 9, 2014Updated 11 years ago
- Deeply supervised density regression for automatic cell counting in microscopy images☆12Jan 31, 2022Updated 4 years ago
- Virtual programming language☆10Dec 5, 2022Updated 3 years ago
- ☆51Feb 19, 2026Updated 2 weeks ago
- A web platform for school☆13Updated this week
- ☆13Jan 28, 2026Updated last month
- A virtual caregiver system that extracts the expression of mental and physical health states through dialogue-based human-computer intera…☆14Jan 29, 2023Updated 3 years ago
- Free DevOps eBooks☆13Apr 23, 2018Updated 7 years ago
- ☆36Apr 7, 2022Updated 3 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- HRA ASCT+B Reporter☆10Nov 20, 2025Updated 3 months ago
- ☆11Mar 31, 2022Updated 3 years ago
- File recovery by magic bytes made in rust.☆18Oct 23, 2025Updated 4 months ago