Detection by Attack: Detecting Adversarial Samples by Undercover Attack
-
Updated
Feb 13, 2021 - Python
Detection by Attack: Detecting Adversarial Samples by Undercover Attack
Cross-platform amateur radio WPX CW contest simulator written in python, based on Morse Runner.
Reproduce multiple adversarial attack methods
Multimode MEPT based on OpenBeacon
针对CIFAR10的Pytorch对抗攻击生成技术: L-BFGS, FGSM, I-FGSM, MI-FGSM, DeepFool, C&W, JSMA, ONE-PIXEL, UPSET
Python implementation of a library for Morse and MorseKOB functionality
Logger for K1USN SST
Talk to the K1EL WinKeyer.
将字符转换成摩尔斯电码并生成相应音频文件播放
CW/Morse Code 2-paddle keyer controlling keyboard input (tested on windows)
This is the CW1 materials of Level 4 BIS student at WIUT - 00009115. Being private, this repository can be accessed by assessor only. The Report part of the CW can be accessed through the link below:
Simulates working Morse (CW), during Field Day.
Add a description, image, and links to the cw topic page so that developers can more easily learn about it.
To associate your repository with the cw topic, visit your repo's landing page and select "manage topics."