
-
Beijing University of Posts and Telecommunications
- Beijing, China
-
10:56
- 8h ahead - https://arycra07.github.io/
Lists (5)
Sort Name ascending (A-Z)
Starred repositories
This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"
[CVPR 2024] "Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training", Di Ming, Peng Ren, Yunlong Wang, Xin Feng*
[PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
[CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Input-aware Dynamic Backdoor Attack (NeurIPS 2020)
ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Repo. explores how we can use these artifacts to develop strong…
Standard Go Project Layout
A cloud-native Go microservices framework with cli tool for productivity.
WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)
The official PyTorch implementation of the paper "MLAE: Masked LoRA Experts for Visual Parameter-Efficient Fine-Tuning"
🚀Vite+Vue3+Gin拥有AI辅助的基础开发平台,支持TS和JS混用。它集成了JWT鉴权、权限管理、动态路由、显隐可控组件、分页封装、多点登录拦截、资源权限、上传下载、代码生成器、表单生成器和可配置的导入导出等开发必备功能。
Invisible Backdoor Attack with Sample-Specific Triggers
PyTorch Face Recognizer based on 'VGGFace2: A dataset for recognising faces across pose and age'
Practise of DeepID for Face Classification
Python module allowing to load the YouTube Faces Database: http://www.cs.tau.ac.il/~wolf/ytfaces
Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper
Simple PyTorch implementations of Badnets on MNIST and CIFAR10.
MIT Deep Learning Book in PDF format (complete and parts) by Ian Goodfellow, Yoshua Bengio and Aaron Courville