Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning
☆10Jul 2, 2019Updated 6 years ago
Alternatives and similar repositories for Target-Agnostic-Attack
Users that are interested in Target-Agnostic-Attack are comparing it to the libraries listed below
Sorting:
- ☆19Jun 26, 2021Updated 4 years ago
- Code for NDSS paper: Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems☆21Nov 24, 2018Updated 7 years ago
- ☆24Jan 3, 2023Updated 3 years ago
- Code release for Catastrophic Forgetting Meets Negative Transfer: Batch Spectral Shrinkage for Safe Transfer Learning (NeurIPS 2019)☆24Nov 29, 2021Updated 4 years ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆19Nov 28, 2018Updated 7 years ago
- BRAVE is a genetic algorithm engine and a simulator for Braitenberg vehicles written in Python☆10Mar 2, 2018Updated 8 years ago
- ☆12Jun 17, 2022Updated 3 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- ☆11Aug 12, 2024Updated last year
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- Deep learning application☆10Dec 11, 2016Updated 9 years ago
- ☆10Sep 25, 2019Updated 6 years ago
- [AAAI 2024] Direction-aware Video Demoiréing with Temporal-guided Bilateral Learning☆14Dec 13, 2023Updated 2 years ago
- Dynamic vision-guided speaker embedding for audio-visual speaker diarization☆12Jul 5, 2022Updated 3 years ago
- scene classification for 360 photos☆12Jun 29, 2017Updated 8 years ago
- ☆20Jan 23, 2026Updated last month
- [TOIS'24] "RecRanker: Instruction Tuning Large Language Model as Ranker for Top-k Recommendation"☆16Dec 1, 2024Updated last year
- ☆50Aug 30, 2024Updated last year
- ☆11May 3, 2016Updated 9 years ago
- ☆18Nov 27, 2017Updated 8 years ago
- ☆14Nov 11, 2025Updated 3 months ago
- Monocular/stereo depth estimation with regression☆12May 16, 2019Updated 6 years ago
- This repository is for the paper Incorporating External POS Tagger for Punctuation Restoration. Proc. Interspeech 2021, 1987-1991, doi: 1…☆11Jul 5, 2023Updated 2 years ago
- VQ-VAE implementation pytorch☆11Mar 15, 2023Updated 2 years ago
- Source code for paper Multi-Task Learning for Depression Detection in Dialogs (SIGDial 2022)☆12Jan 18, 2025Updated last year
- ☆12Aug 25, 2023Updated 2 years ago
- This code is the official implementation of paper "Certifiably Robust Image Watermark".☆15Aug 7, 2024Updated last year
- Source code and speech samples for the DSU-AVO paper accepted to INTERSPEECH 2023☆12May 13, 2024Updated last year
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- example code to use CT data and VTK for 3D reconstruction☆11Sep 16, 2020Updated 5 years ago
- Beamer template with CUHK colors.☆14Jun 8, 2015Updated 10 years ago
- Code for the paper "Watermarking Makes Language Models Radioactive"☆21Oct 25, 2024Updated last year
- Contains an implementation of "Imitation Learning via Kernel Mean Embedding (2018, AAAI)"☆11Oct 2, 2018Updated 7 years ago
- Smart Surveillance Interest Group Library☆16Sep 19, 2017Updated 8 years ago
- [NeurIPS 2022] "Losses Can Be Blessings: Routing Self-Supervised Speech Representations Towards Efficient Multilingual and Multitask Spee…☆17Sep 19, 2023Updated 2 years ago
- [NeurIPS 2025] The official implementation of "T2SMark: Balancing Robustness and Diversity in Noise-as-Watermark for Diffusion Models"☆43Nov 2, 2025Updated 4 months ago
- Code for InterSpeech 2024 Paper: LipGER: Visually-Conditioned Generative Error Correction for Robust Automatic Speech Recognition☆18Jul 16, 2024Updated last year
- ☆21Nov 24, 2022Updated 3 years ago
- FlowNet 2.0: Evolution of Optical Flow Estimation with Deep Networks☆12May 24, 2017Updated 8 years ago