rohban-lab / Salehi_submitted_2020View external linksLinks
This repository contains the codes to reproduce the results of our proposed novelty detection algorithm based on adversarially robust autoencoder.
☆19Mar 24, 2023Updated 2 years ago
Alternatives and similar repositories for Salehi_submitted_2020
Users that are interested in Salehi_submitted_2020 are comparing it to the libraries listed below
Sorting:
- A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove…☆21Mar 14, 2022Updated 3 years ago
- Unsupervised Anomaly Detection and Segmentation via Deep Feature Correspondence☆21Nov 30, 2022Updated 3 years ago
- ☆25Oct 6, 2019Updated 6 years ago
- ☆56Apr 19, 2021Updated 4 years ago
- Fake It Till You Make It: Near-Distribution Novelty Detection by Score-Based Generative Models☆28Jan 6, 2023Updated 3 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated last year
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- 变化检测的相关工作,一些复现代码和自己的工作☆10Sep 24, 2019Updated 6 years ago
- 2BiVQA is a no-reference deep learning based video quality assessment metric.☆34Sep 26, 2022Updated 3 years ago
- Helper code for the 2021 Kaggle NFL Helmet Assignment Task☆13Sep 22, 2021Updated 4 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- MediaPipeのFaceMesh検出を用いて、虹彩部分に写輪眼(©NARUTO -ナルト-)を表示するプログラム☆11Apr 16, 2022Updated 3 years ago
- Wasserstein BiGAN (Bidirectional GAN trained using Wasserstein distance)☆37Dec 21, 2019Updated 6 years ago
- Least-squares Reverse Time Migration using 1D scalar wave equation. Very simple and for demonstration purposes only.☆10Sep 4, 2017Updated 8 years ago
- ☆12Jun 22, 2020Updated 5 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆14Dec 19, 2025Updated last month
- ☆12Jul 7, 2022Updated 3 years ago
- A simple and effective method for single-class classification of images☆161Nov 29, 2021Updated 4 years ago
- Tutorials for FLAVA model https://arxiv.org/abs/2112.04482☆12Jun 22, 2022Updated 3 years ago
- ☆13Sep 23, 2024Updated last year
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆14Jan 22, 2025Updated last year
- ☆10Nov 3, 2023Updated 2 years ago
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- Echarts get data from database. Echarts 从数据库中获取动态数据。 The project can run on both eclipse and idea.☆10Oct 18, 2017Updated 8 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- Just a demonstration of some sampling techniques (rejection sampling, importance sampling, sampling importance resampling, Metropolis sam…☆11Aug 24, 2013Updated 12 years ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆12Aug 14, 2025Updated 6 months ago
- ☆12Jan 13, 2022Updated 4 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- ☆11Oct 28, 2023Updated 2 years ago
- HSTGODE code☆10Nov 26, 2023Updated 2 years ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Nov 9, 2025Updated 3 months ago
- ☆10May 26, 2024Updated last year
- Let's play with digital holograms☆11Jul 4, 2021Updated 4 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- ☆11Jul 19, 2022Updated 3 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago