☆20Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for My-LeetCode-Solutions
Users that are interested in My-LeetCode-Solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for "Training Generative Adversarial Networks Via Turing Test".☆13May 29, 2020Updated 5 years ago
- The python notebook is on googles new collabatory tool. Its a churn model being run on 3 different algorithms to compare.☆10Mar 3, 2018Updated 8 years ago
- mxmind for obsidian plugin☆13May 8, 2025Updated 11 months ago
- System.Robots V1.0☆10May 5, 2017Updated 8 years ago
- 太原市租房数据爬取与可视化以及后续的价格预测☆10Aug 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Solutions of Kaggle Competition☆15Jan 28, 2018Updated 8 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 6 months ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- BUAA CST Spring 2019 Cryptography Experiment☆12Nov 23, 2019Updated 6 years ago
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Jul 16, 2021Updated 4 years ago
- 使用yolox训练自己的数据集☆13May 9, 2023Updated 2 years ago
- A CNN accelerator design inspired by MIT Eyeriss project☆20Aug 14, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆28Jan 25, 2025Updated last year
- Python面试常见的170道题目的解析和源码☆15Aug 12, 2019Updated 6 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Aug 9, 2019Updated 6 years ago
- Electron Radio Hacker - A simple alternative to URH☆51Aug 23, 2023Updated 2 years ago
- ☆19Mar 26, 2022Updated 4 years ago
- ☆20May 6, 2022Updated 3 years ago
- COMPASS CTF team wiki pages☆21May 19, 2024Updated last year
- Transform any wall to an intelligent whiteboard☆16Feb 11, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Official implementation for "HuRef: HUman-REadable Fingerprint for Large Language Models" (NeurIPS2024)☆15Jun 17, 2025Updated 9 months ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Oct 5, 2022Updated 3 years ago
- ☆23Sep 21, 2022Updated 3 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆23Sep 8, 2021Updated 4 years ago
- Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Bla…☆21Apr 16, 2025Updated last year
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Jun 19, 2020Updated 5 years ago
- 南方科技大学计算机系一些课程的课件以及个人笔记☆16Aug 4, 2022Updated 3 years ago
- 智能计算系统实验 在Cambricon编程平台上实现用BangC实现五个算子☆31Dec 5, 2019Updated 6 years ago
- Cross platform menu item installation☆48Apr 6, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Jan 7, 2021Updated 5 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- Pangolin is developed using Go and Fyne, currently focusing on proximity-based internal network penetration testing for mobile platforms�…☆34Nov 13, 2024Updated last year
- A versatile software tool to analyse and configure CANopen devices.☆39Updated this week
- Code and data for paper "Can Watermarked LLMs be Identified by Users via Crafted Prompts?" Accepted by ICLR 2025 (Spotlight)☆28Dec 28, 2024Updated last year
- 我的笔记☆24Jan 14, 2026Updated 3 months ago