Paper https://arxiv.org/pdf/2306.06071.pdf Analysing how adversarial attacks aaffect YOLO Object Detection and visualising GradCAM
☆23Dec 21, 2023Updated 2 years ago
Alternatives and similar repositories for gradcam-yolo
Users that are interested in gradcam-yolo are comparing it to the libraries listed below
Sorting:
- ☆13May 24, 2023Updated 2 years ago
- Source code to execute signal injection attacks against CCD image sensors☆11Aug 26, 2021Updated 4 years ago
- Generate adversarial patches against YOLOv5 🚀☆68Oct 25, 2025Updated 4 months ago
- ☆23Sep 1, 2020Updated 5 years ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆61Oct 20, 2024Updated last year
- The official PyTorch implementation of "Adversarially-Aware Robust Object Detector"☆64Sep 22, 2022Updated 3 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Mar 16, 2022Updated 3 years ago
- Code for M-CD☆42Apr 1, 2025Updated 11 months ago
- ☆15Jan 14, 2025Updated last year
- signal denoising + modulation recognition☆10Aug 7, 2018Updated 7 years ago
- ☆17Mar 22, 2025Updated 11 months ago
- ☆40Jan 7, 2023Updated 3 years ago
- Large AI model for wireless localization☆19Jun 18, 2025Updated 8 months ago
- AST-GCN: Attribute-Augmented Spatiotemporal Graph Convolutional Network for Traffic Forecasting. This is my implementation of this model …☆11Aug 31, 2023Updated 2 years ago
- Single-Source Domain Generalization for Bearing Fault Diagnosis Using Feature-Augmented Adaptive Neuro-Fuzzy Inference System☆11Apr 13, 2024Updated last year
- UCI's first women-centric hackathon!☆11Updated this week
- Public WiFi Dataset☆16Jan 23, 2024Updated 2 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- SpeedVision is an AI-powered tool that detects and calculates vehicle speed from video footage using YOLO-based object detection and fram…☆10Sep 22, 2024Updated last year
- ☆14Jun 21, 2023Updated 2 years ago
- A deep-learning framework for smartphone identification via passive traffic fingerprinting.☆11Feb 17, 2023Updated 3 years ago
- ☆10Dec 3, 2023Updated 2 years ago
- ☆13Oct 8, 2024Updated last year
- The code will come soon.☆15Sep 12, 2025Updated 5 months ago
- Veri yapıları dersi 2022☆10Jan 7, 2023Updated 3 years ago
- WiSR: Wireless Domain Generalization Based on Style Randomization☆11Nov 17, 2023Updated 2 years ago
- ☆11May 6, 2021Updated 4 years ago
- [TPAMI2025] BackMix: Regularizing Open Set Recognition by Removing Underlying Fore-Background Priors☆14Apr 23, 2025Updated 10 months ago
- Secure and Scalable Federated Learning using Serverless Computing☆12Jan 31, 2024Updated 2 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 6 months ago
- ☆14Apr 1, 2025Updated 11 months ago
- ☆15Oct 16, 2024Updated last year
- 🧟 The hackathon where 150 teens built fun tech to survive the zombie apocalypse.☆13Mar 2, 2026Updated last week
- This project used Yolov8/AnimeGAN and Flask to accomplish the task of background segmentation , background remove and background replacem…☆12Apr 12, 2024Updated last year
- ☆13Jun 17, 2023Updated 2 years ago
- 可用于无人机个体识别的无人机射频指纹数据集☆26Apr 6, 2025Updated 11 months ago
- Public repository for the ICLR'23 paper "Few-shot domain adaptation for end-to-end communication"☆10Mar 4, 2023Updated 3 years ago
- Official source code for Time is Not Enough: Time-Frequency based Explanation for Time-Series Black-Box Models☆12Dec 5, 2024Updated last year
- The Pytorch implementation of "RSCNet: Dynamic CSI Compression for Cloud-based WiFi Sensing"☆13Sep 25, 2024Updated last year