☆10Mar 6, 2020Updated 6 years ago
Alternatives and similar repositories for AdvPattern
Users that are interested in AdvPattern are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metric Adversarial Attacks and Defense☆19Sep 28, 2021Updated 4 years ago
- We propose MMAD, a novel automated pipeline for precise AD generation. MMAD introduces ambient music alongside visual and linguistic, enh…☆17Dec 31, 2024Updated last year
- Multilayered secret detection tool☆42Feb 11, 2026Updated 2 months ago
- ☆10May 4, 2023Updated 3 years ago
- Collection of patches I apply to my personal GrapheneOS builds☆21Apr 23, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆26Apr 25, 2026Updated last week
- MRI preprocessing / segmentation in under 30s☆20Mar 13, 2026Updated last month
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Apr 23, 2026Updated 2 weeks ago
- 用于同济大学体育场馆预约的插件☆19Mar 17, 2025Updated last year
- Code for the CVPR 2020 paper "Learning Instance Occlusion for Panoptic Segmentation"☆13Jun 17, 2020Updated 5 years ago
- Incorporating the memory mechanism into the transformer and employing a parallel weighting structure to obtain a better utterance-level r…☆22Oct 4, 2025Updated 7 months ago
- Advanced shellcode loader with AES-256, EDR/AMSI/ETW bypass, indirect syscalls, evasion, early-bird APC injection and PPID spoofing.☆33Apr 16, 2026Updated 3 weeks ago
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- ☆27Jun 29, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for [Re] On the Reproducibility of Post-Hoc Concept Bottleneck Models.☆13Nov 27, 2024Updated last year
- Code for I-RAVEN-X generation and experiments☆24Sep 18, 2025Updated 7 months ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆34Oct 3, 2025Updated 7 months ago
- inductive reasoning benchmark with subregular hierarchy for string-to-string transformation☆20Jun 27, 2025Updated 10 months ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Nov 3, 2018Updated 7 years ago
- Jailbreak detection bypass for the iOSSecuritySuite Swift library☆17Feb 18, 2024Updated 2 years ago
- iOS SSL Bypass & Real-Time Traffic Monitor – A Frida-based script for bypassing SSL pinning and monitoring network traffic on iOS apps in…☆21Mar 11, 2025Updated last year
- Cross Modal Focal Loss for RGBD Face Anti-Spoofing☆12Jul 12, 2021Updated 4 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Person Re-identification Data Augmentation Method with Adversarial Defense Effect☆21Mar 30, 2024Updated 2 years ago
- 自制Orange操作系统☆17Feb 9, 2018Updated 8 years ago
- PyTorch implementation of paper "MT-ORL: Multi-Task Occlusion Relationship Learning" (ICCV 2021)☆19Oct 17, 2021Updated 4 years ago
- Mujde☆23Apr 25, 2025Updated last year
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- [ACM Computing Survey 2025] Vertical Federated Learning for Effectiveness, Security, Applicability: A Survey, by MARS Group at Wuhan Univ…☆23Apr 9, 2025Updated last year
- Apply a bilateral filter to upsample a depth image, guided by an RGB image.☆12Jun 6, 2021Updated 4 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Apr 1, 2024Updated 2 years ago
- ☆16Jul 23, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆19Jun 28, 2025Updated 10 months ago
- ☆14Oct 7, 2022Updated 3 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆83Jul 20, 2023Updated 2 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- Clean and easy to extend baseline for image captioning in tensorflow☆10Jul 12, 2016Updated 9 years ago
- I'm going to use the Winograd’s minimal filtering algorithms to introduce a new class of fast algorithms for convolutional neural networks…☆12Mar 22, 2018Updated 8 years ago
- DolphinDB vs InfluxDB 性能对比测试报告 (Performance Comparision Test Report)☆10Apr 15, 2019Updated 7 years ago