Tensorflow implementation of Our APE-GAN
☆23Apr 24, 2018Updated 8 years ago
Alternatives and similar repositories for APE-GAN
Users that are interested in APE-GAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch Implementation of APE-GAN☆15Oct 29, 2017Updated 8 years ago
- ☆13Nov 10, 2019Updated 6 years ago
- Implementation of Virtual adversarial training with chainer☆40Nov 9, 2017Updated 8 years ago
- A simple conditional version of the Boundary Equilibrium Generative Adversarial Networks (CBEGANs)☆11Jun 13, 2017Updated 8 years ago
- Tensorflow code for Sparse Adversarial Perturbations for Videos☆23Mar 8, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- The Virtual device for OpenNI 2☆11Apr 16, 2018Updated 8 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Aug 10, 2017Updated 8 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- An implementation of the paper Gradient Outlier Removal for Gradient-Domain Path Tracing☆13May 30, 2019Updated 6 years ago
- LaTeX templates I created for authoring research papers☆16Mar 19, 2019Updated 7 years ago
- paper: https://arxiv.org/abs/2110.09305☆18Jan 30, 2022Updated 4 years ago
- Use Tensorflow to break captcha as part of the Blacklight challense☆25Aug 2, 2018Updated 7 years ago
- ☆12Dec 2, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆113Feb 14, 2018Updated 8 years ago
- Source code for the paper Deep Convolutional Reconstruction for Gradient-Domain Rendering.☆18Jan 13, 2020Updated 6 years ago
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- 六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。☆11Mar 15, 2020Updated 6 years ago
- Neural Turing Machine☆13Jun 18, 2018Updated 7 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- Attack InceptionV3 net using FGM( fast gradient method) and show saliency maps.☆13Nov 9, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Machine Learning with SPDZ☆20Jul 25, 2025Updated 9 months ago
- Dense Receptive Field For Object Detection☆25Nov 26, 2018Updated 7 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- Mapping Images to Scene Graphs with Permutation-Invariant Structured Prediction☆12Aug 1, 2018Updated 7 years ago
- ☆19Mar 24, 2023Updated 3 years ago
- Use pytorch the right way http://pytorch.org/docs/☆14Nov 1, 2017Updated 8 years ago
- ☆16Aug 27, 2018Updated 7 years ago
- GRIN is a proposed standard graph retrieval interface in GraphScope.☆16Mar 25, 2024Updated 2 years ago
- OpenCV implementation of the poisson image blend and Mean-Value-Coordinate image clone method☆10Nov 14, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Pytorch implementation of Wasserstein Auto-Encoders☆25Feb 7, 2018Updated 8 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks