Skip to content
View jS5t3r's full-sized avatar
🎯
Focusing
🎯
Focusing

Organizations

@tugLatexTemplates

Block or report jS5t3r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
95 results for source starred repositories
Clear filter

Using techniques in Hashing to match dataframes

Jupyter Notebook 1 Updated Jun 27, 2019

Code for "Preference Tuning For Toxicity Mitigation Generalizes Across Languages"

Jupyter Notebook 14 Updated Jul 27, 2024
Python 1 Updated Jun 24, 2024
Rust 2 Updated Aug 22, 2024

Benchmarking Generalized Out-of-Distribution Detection

Python 817 103 Updated Aug 17, 2024

[ICML 2023] The official implementation of the paper "TabDDPM: Modelling Tabular Data with Diffusion Models"

Python 366 81 Updated Jul 13, 2024

Privacy backdoors

Python 38 3 Updated Apr 28, 2024

A Native-PyTorch Library for LLM Fine-tuning

Python 3,839 335 Updated Aug 24, 2024

An Open Robustness Benchmark for Jailbreaking Language Models [arXiv 2024]

Python 155 15 Updated Aug 15, 2024

End-to-end implementation of ML-based Android malware detectors.

Python 7 4 Updated May 9, 2024

Example: PlatformIO with CubeMX and stm32pio

2 Updated Jan 30, 2024

Advanced AI Explainability for computer vision. Support for CNNs, Vision Transformers, Classification, Object detection, Segmentation, Image similarity and more.

Python 10,078 1,526 Updated Aug 18, 2024

Visualization of Adversarial Examples

Python 32 6 Updated Oct 14, 2018

Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"

Python 37 4 Updated Apr 24, 2024

An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.

Python 123 10 Updated Feb 20, 2024

Implementation of "Beating Backdoor Attack at Its Own Game" (ICCV-23).

Python 8 Updated Nov 22, 2023
Jupyter Notebook 2 Updated Nov 4, 2023

A toolkit for polynomial IOPs (PIOPs)

Rust 416 149 Updated Aug 24, 2024
Rust 750 276 Updated Aug 21, 2024

Official repository for CVPR2022 publication, ViM: Out-Of-Distribution with Virtual-logit Matching

Python 80 11 Updated Sep 18, 2023

write-up

1 Updated Aug 27, 2023

A beautiful, simple, clean, and responsive Jekyll theme for academics

HTML 10,337 10,858 Updated Aug 23, 2024

Malware detection using the Drebin dataset

Python 20 14 Updated Aug 11, 2023

Fast Diffusion Models with Transformers

Python 657 88 Updated Oct 7, 2023

A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations.

Python 245 32 Updated Jan 29, 2023
Python 46 3 Updated Aug 9, 2023

PhD Thesis LaTeX Template, according to the rules of Combined Faculty of Natural Sciences and Mathematics, Heidelberg University, Germany

TeX 19 5 Updated Jan 13, 2024

[CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu

Python 20 1 Updated Apr 3, 2023
Next