Pinned Repositories
attack-and-defense-methods
A curated list of papers on adversarial machine learning (adversarial examples and defense methods).
Cryptography
云南大学软件学院密码学实验内容
K-Anonymity
k匿名
Pixel-Attack
one pixel attack on cifar10 by pytorch
pretrain-model-attack
adversarial attack using torchvision pretrained model on ciafr10
pytorch-grad-cam
PyTorch implementation of Grad-CAM
robot
可以做许多事情的机器人助手
torchtune
A Native-PyTorch Library for LLM Fine-tuning
wide_attack
adversarial attack on CIFAR10 to test different wide network
yolov5
YOLOv5实现安全帽检测
zhhiyuan's Repositories
zhhiyuan/yolov5
YOLOv5实现安全帽检测
zhhiyuan/K-Anonymity
k匿名
zhhiyuan/Pixel-Attack
one pixel attack on cifar10 by pytorch
zhhiyuan/Cryptography
云南大学软件学院密码学实验内容
zhhiyuan/pretrain-model-attack
adversarial attack using torchvision pretrained model on ciafr10
zhhiyuan/wide_attack
adversarial attack on CIFAR10 to test different wide network
zhhiyuan/attack-and-defense-methods
A curated list of papers on adversarial machine learning (adversarial examples and defense methods).
zhhiyuan/pytorch-grad-cam
PyTorch implementation of Grad-CAM
zhhiyuan/robot
可以做许多事情的机器人助手
zhhiyuan/torchtune
A Native-PyTorch Library for LLM Fine-tuning
zhhiyuan/transformer
PyTorch Implementation of "Attention Is All You Need"
zhhiyuan/vit-pytorch
Implementation of Vision Transformer, a simple way to achieve SOTA in vision classification with only a single transformer encoder, in Pytorch
zhhiyuan/yolov5-tensorrt
实现YOLOv5使用tensorrt加速