msafdemo / MSAF
☆29Updated last month
Alternatives and similar repositories for MSAF:
Users that are interested in MSAF are comparing it to the libraries listed below
- ☆73Updated 2 months ago
- ☆115Updated 2 weeks ago
- ☆78Updated 4 months ago
- A benchmark for logging statement generation.☆20Updated 5 months ago
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆34Updated 10 months ago
- This project help you understand the concepts of histogram equalization and histogram specification in image processing learning from a p…☆9Updated last year
- Crack Vigenere Ciphertext using statistic method (Index of Coincidence and Chi-square)☆18Updated last year
- 该Agent是一个基于eBPF技术的容器异常检测框架,旨在通过收集容器的行为特征和指标特征,利用人工智能算法自动识别具有异常行为的容器。☆110Updated last week
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆28Updated 9 months ago
- alsap_frontend☆23Updated 2 months ago
- 2d game, a birthday present for my girl friend, the game prototype is Magic Tower☆26Updated 4 months ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack☆33Updated 5 months ago
- A demo project to demonstrate how DES encryption/decryption works.☆13Updated 3 years ago
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆9Updated 3 months ago
- ☆16Updated 5 months ago
- ☆13Updated last year
- Code of Journey to the Center of the Knowledge Neurons: Discoveries of Language-Independent Knowledge Neurons and Degenerate Knowledge Ne…☆24Updated last year
- ACL 2024☆31Updated 7 months ago
- StrategyLLM: Large Language Models as Strategy Generators, Executors, Optimizers, and Evaluators for Problem Solving☆21Updated 4 months ago
- ☆35Updated 3 months ago
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆55Updated 6 months ago
- [NeurIPS 2024] GuardT2I: Defending Text-to-Image Models from Adversarial Prompts☆31Updated 5 months ago
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆41Updated 11 months ago
- [NeurIPS 2024] EffiBench: Benchmarking the Efficiency of Automatically Generated Code☆51Updated 4 months ago
- 通过撤销数据对联邦学习模型的训练更新,解决了联邦学习中的数据隐私安全问题。☆25Updated last month
- Practical Detection of Trojan Neural Networks☆119Updated 4 years ago
- DistributedNIDS-Framework is an open-source distributed intrusion detection system, combining the Snort engine with Apache Spark's data p…☆21Updated 4 months ago
- This includes the original implementation of Retrieval-Oriented Knowledge for Click-Through Rate Prediction.☆21Updated 5 months ago
- ☆11Updated 6 months ago
- ☆12Updated last year