Shengming Yuan's repositories
tf_to_pytorch_model
Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.
Adversarial_Attacks_and_Defense_NeurIPS2022
A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.
ICML2024-paperlist
Summaries of ICML 2024 papers
MMDNN_simple_example
MMDNN_simple_example: convert tensorflow model to pytorch model
Adversarial-attack-on-Person-ReID-With-Deep-Mis-Ranking
This is a pytorch implementation of the CVPR2020 paper: Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
ant-design-pro
π¨π»βπ»π©π»βπ» Use Ant Design like a Pro!
backdoor-learning-resources
A list of backdoor learning resources
benchmark_results
Visual Tracking Paper List
carla
Open-source simulator for autonomous driving research.
CompilerGym
A reinforcement learning toolkit for compiler optimizations
deep-learning-for-image-processing
deep learning for image processing including classification and object-detection etc.
DRN
Closed-loop Matters: Dual Regression Networks for Single Image Super-Resolution
easy-scraping-tutorial
Simple but useful Python web scraping tutorial code.
exposure
Learning infinite-resolution image processing with GAN and RL from unpaired image datasets, using a differentiable photo editing model.
generators-with-stylegan2
Here is a series of face generators based on StyleGAN2
MMdnn
MMdnn is a set of tools to help users inter-operate among different deep learning frameworks. E.g. model conversion and visualization. Convert models between Caffe, Keras, MXNet, Tensorflow, CNTK, PyTorch Onnx and CoreML.
models
Models and examples built with TensorFlow
Neural-IMage-Assessment
A PyTorch Implementation of Neural IMage Assessment
NRP
Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)
Patch-wise-iterative-attack
Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.
PDFToExcel
This is the companion repository of the article https://tomassetti.me/how-to-convert-a-pdf-to-excel/
PyTorch-Course
JULYEDU PyTorch Course
releasing-research-code
Tips for releasing research code in Machine Learning (with official NeurIPS 2020 recommendations)
SimulatorAttack
The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"
smoothing
Provable adversarial robustness at ImageNet scale
Swin-Transformer-Semantic-Segmentation
This is a fine-tuned version for "Swin Transformer: Hierarchical Vision Transformer using Shifted Windows" on Semantic Segmentation.
Visual-Adversarial-Examples-Jailbreak-Large-Language-Models
Repository for the Paper (preprint) --- Visual Adversarial Examples Jailbreak Large Language Models
VT
Enhancing the Transferability of Adversarial Attacks through Variance Tuning