zhangyuc / CCNNView external linksLinks
Convexified Convolutional Neural Networks
☆15Dec 13, 2016Updated 9 years ago
Alternatives and similar repositories for CCNN
Users that are interested in CCNN are comparing it to the libraries listed below
Sorting:
- The dataset and statistical analysis code released with the submission of EMNLP 2017 paper "Why We Need New Evaluation Metrics for NLG"☆19Nov 16, 2021Updated 4 years ago
- MACER: MAximizing CErtified Radius (ICLR 2020)☆31Jan 5, 2020Updated 6 years ago
- ☆12May 6, 2022Updated 3 years ago
- Java implementation of the brown clustering algorithm that clusters words based on their contexts in a text corpus.☆11Mar 2, 2018Updated 7 years ago
- ☆10May 28, 2022Updated 3 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- ☆15Nov 27, 2025Updated 2 months ago
- ☆11Dec 9, 2018Updated 7 years ago
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- ☆10Dec 18, 2024Updated last year
- Deep Learning Tutorial notes and code. See the wiki for more info.☆10Oct 29, 2015Updated 10 years ago
- A very simple variant of adversarial training that yields excellent results on MNIST☆12Mar 19, 2016Updated 9 years ago
- ☆12Nov 19, 2024Updated last year
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago
- ☆10Mar 14, 2018Updated 7 years ago
- springboot auto xss☆11May 23, 2018Updated 7 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Official repository of "Beyond Spatial Frequency: Pixel-wise Temporal Frequency-based Deepfake Video Detection" [ICCV 2025]☆20Jan 17, 2026Updated 3 weeks ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆11Jan 3, 2026Updated last month
- A package implementing various controllers for first order DS tasks☆10Sep 12, 2019Updated 6 years ago
- Changes in this fork has been merged to upstream.☆16Jun 10, 2025Updated 8 months ago
- The stl files and code for the V2 DexHand☆46May 26, 2025Updated 8 months ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Jan 27, 2025Updated last year
- Panda's RobotModule and extensions for mc_rtc☆11Dec 16, 2025Updated last month
- ☆11Apr 19, 2018Updated 7 years ago
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- [DEPRECATED] You should use web3.py instead.☆10Nov 24, 2016Updated 9 years ago
- ☆12Jan 25, 2025Updated last year
- ☆10Oct 31, 2022Updated 3 years ago
- Decree Fiat Shamir Library☆11Mar 27, 2024Updated last year
- ☆15Apr 4, 2024Updated last year
- ☆12Jan 29, 2021Updated 5 years ago
- Experiments from "The Description Length of Deep Learning Models"☆10Aug 1, 2018Updated 7 years ago
- ☆10Mar 20, 2023Updated 2 years ago
- Bag-of-features image classification using OpenCV☆12Sep 25, 2013Updated 12 years ago
- Tiniest ELF (Executable and Linkable Format) executable☆14Aug 27, 2018Updated 7 years ago
- A sum-of-squares toolbox for stability analysis☆10Dec 4, 2024Updated last year
- VertMetric: An abstractive summarization evaluation package. VERT stands for Versatile Evaluation of Reduced Texts.☆11Dec 20, 2018Updated 7 years ago