TensorFlow Speech Recognition Challenge (Top 15%)
☆14Jan 16, 2018Updated 8 years ago
Alternatives and similar repositories for kaggle-speech-recognition
Users that are interested in kaggle-speech-recognition are comparing it to the libraries listed below
Sorting:
- ConvNets for Audio Recognition using Google Commands Dataset☆70Feb 10, 2019Updated 7 years ago
- 1st place solution to the DCASE 2019 - Task 5 - Urban Sound Tagging☆30Mar 19, 2021Updated 4 years ago
- Documents and other resources specifically related to my role as a Bluegiga FAE☆14Jun 11, 2013Updated 12 years ago
- (planned to) make dataset for sound source localization with two robots that have microphone arrays and speaker, and train CNN-based loca…☆12Nov 30, 2018Updated 7 years ago
- ☆10Jun 23, 2018Updated 7 years ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 5 months ago
- Python Applications - Tic-Tac-Toe, Flipkart Item Price finder, Online Coding Platform Rating Tracker, Dice Game, Pomodoro App etc.☆11Dec 5, 2022Updated 3 years ago
- ☆13Feb 23, 2026Updated 2 weeks ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Functions to scrape web pages from ebird.org☆10Jul 15, 2025Updated 7 months ago
- Switchboard Security & Privacy Plug☆16Mar 2, 2026Updated last week
- Restore iOS devices without updating via rootfilesystem DMG☆10Nov 9, 2018Updated 7 years ago
- A keras re-implementation of DaSiameseRPN, weights converted from original pytorch version☆11Dec 20, 2018Updated 7 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- subtitled NSMenuItems on macOS 10.11 and newer☆10Mar 16, 2021Updated 4 years ago
- A platform for hackers to show off their creations.☆14Jul 9, 2018Updated 7 years ago
- ☆10Mar 29, 2019Updated 6 years ago
- (Re)Configuration toolkit☆14Feb 19, 2026Updated 2 weeks ago
- Command to run a dev-server, build etc. with OpenPGP. On top of webpack.☆11Aug 11, 2021Updated 4 years ago
- Waveflow: signal processing with tensorflow.☆13May 21, 2018Updated 7 years ago
- Lapwing is program to help birders analyze their personal eBird sightings. It has a graphical user interface that lets users create filte…☆12May 29, 2020Updated 5 years ago
- 💬 A tiny and elegant library to handle forms with React☆15Sep 4, 2025Updated 6 months ago
- Logged PS Remote Command Wrapper for Blue Team Forensics/IR☆11Apr 12, 2018Updated 7 years ago
- ☆11Aug 30, 2013Updated 12 years ago
- A metric learning method to learn a provably robust Mahalanobis distance☆10Jan 29, 2022Updated 4 years ago
- Project of SJTU-CS438 Internet-based Information Extraction Technologies☆11Oct 19, 2018Updated 7 years ago
- Phonetically balanced text to speech sentences☆10Aug 16, 2021Updated 4 years ago
- Use Pocketsphinx to detect keywords offline☆13Jul 13, 2016Updated 9 years ago
- A spaced repetition algorithm to analyze several responses from the students and give an approximate score of how much they remember the …☆12Feb 7, 2017Updated 9 years ago
- Tools and analytics for smart derivative contracts.☆15Jan 21, 2026Updated last month
- ☆14Jan 17, 2023Updated 3 years ago
- A collection of category-specific host files☆14Oct 18, 2025Updated 4 months ago
- Benchmark Python and Cython code☆13Jun 13, 2014Updated 11 years ago
- Java solution programs, problem statements, and test input/output files.☆17Apr 17, 2024Updated last year
- ☆13Aug 31, 2024Updated last year
- Automatically exported from code.google.com/p/des-linear-and-differential-cryptoanalysis☆10Nov 15, 2015Updated 10 years ago
- Download musique from mixcloud☆11Aug 12, 2018Updated 7 years ago
- Chef cookbooks for managing a Ceph cluster☆12Apr 2, 2023Updated 2 years ago