☆12Sep 14, 2023Updated 2 years ago
Alternatives and similar repositories for Cont-Steal
Users that are interested in Cont-Steal are comparing it to the libraries listed below
Sorting:
- [ICLR 2025] Official implementation of 'Hidden in the Noise: Two-Stage Robust Watermarking for Images'☆13May 5, 2025Updated 9 months ago
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆22May 3, 2022Updated 3 years ago
- The official TensorFlow implementation for ICCV'21 paper 'Dual Contrastive Loss and Attention for GANs'☆34Apr 16, 2023Updated 2 years ago
- ☆11Dec 23, 2024Updated last year
- StegTransX: A Lightweight Deep Steganography Method for High-Capacity Hiding and JPEG Compression Resistance☆17May 18, 2025Updated 9 months ago
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Apr 16, 2023Updated 2 years ago
- ☆11Oct 30, 2024Updated last year
- Code for the AAAI 2024 paper: "AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack" (accepted).☆12Mar 28, 2024Updated last year
- Deep learning based automatic modulation classification for sub-carriers of OFDM signals.☆12Jan 3, 2024Updated 2 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Nov 4, 2020Updated 5 years ago
- ☆10Dec 18, 2024Updated last year
- Official Implementation for "Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approxim…☆12Aug 14, 2024Updated last year
- Deformable DETR: Deformable Transformers for End-to-End Object Detection. This is an alternative for running custom datasets on Deformabl…☆14Jan 24, 2022Updated 4 years ago
- CLearning is a general continual learning framework☆13Jan 31, 2025Updated last year
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- 自动调制识别(AMR)☆19Nov 16, 2023Updated 2 years ago
- ☆10Jun 16, 2020Updated 5 years ago
- This work home of the PO-233 discipline at ITA shows how to use a machine learning for digital modulation classification.☆12Jun 30, 2020Updated 5 years ago
- Code containing various models for automatic modulation classification (AMC).☆17Oct 5, 2024Updated last year
- Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks☆12Jan 11, 2025Updated last year
- [arXiv 2024] PyTorch implementation of RRD: https://arxiv.org/abs/2407.12073☆13Dec 2, 2025Updated 3 months ago
- Adapter-X: A Novel General Parameter-Efficient Fine-Tuning Framework for Vision☆11Jul 22, 2024Updated last year
- Implementation of reflection symmetry in convolutional layers (Tensorflow 1.X)☆13Oct 15, 2020Updated 5 years ago
- ☆11Mar 3, 2025Updated last year
- This is the official repository for "DiffSG: A Generative Solver for Network Optimization with Diffusion Model" and "Diffusion Models as …☆19Feb 10, 2025Updated last year
- Some backbone networks commonly used in AMR (Pytorch Version)☆14Jun 3, 2025Updated 9 months ago
- In this project, we have developed a basic CNN model which is used for "Automatic Modulation Classification" using constellation diagrams…☆15Jun 29, 2024Updated last year
- django考勤管理系统☆13Apr 22, 2018Updated 7 years ago
- Performing C&W attack on Recurrent Neural Network☆12Sep 26, 2018Updated 7 years ago
- 离线的LLM文本隐写程序。Offline LLM text steganography program.☆21Sep 7, 2025Updated 5 months ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 5 months ago
- Official implementation of T2Vs Meet VLMs: A Scalable Multimodal Dataset for Visual Harmfulness Recognition☆21Oct 23, 2024Updated last year
- [TNNLS] Toward Explainable and Fine-Grained 3D Grounding through Referring Textual Phrases☆16Jul 10, 2025Updated 7 months ago
- The code of paper: Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing (CVPR 2024))☆19Mar 12, 2024Updated last year
- PyTorch implementation of the paper: "Improving 2D Face Recognition via Discriminative Face Depth Estimation"☆14May 25, 2020Updated 5 years ago
- Code for the paper "Watermarking Makes Language Models Radioactive"☆21Oct 25, 2024Updated last year
- A numpy based python package with pytorch-like interface for training a Convolution Neural Network.☆13Jun 4, 2021Updated 4 years ago
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Apr 19, 2024Updated last year
- Improve JPEG reconstruction using deep learning.☆15Aug 24, 2019Updated 6 years ago