Detection by Attack: Detecting Adversarial Samples by Undercover Attack
-
Updated
Feb 13, 2021 - Python
Detection by Attack: Detecting Adversarial Samples by Undercover Attack
Cross-platform amateur radio WPX CW contest simulator written in python, based on Morse Runner.
Reproduce multiple adversarial attack methods
Multimode MEPT based on OpenBeacon
Adversarial attack generation techniques for CIFAR10 based on Pytorch: L-BFGS, FGSM, I-FGSM, MI-FGSM, DeepFool, C&W, JSMA, ONE-PIXEL, UPSET
Python implementation of a library for Morse and MorseKOB functionality
Logger for K1USN SST
Talk to the K1EL WinKeyer.
将字符转换成摩尔斯电码并生成相应音频文件播放
CW/Morse Code 2-paddle keyer controlling keyboard input (tested on windows)
Morse decoder program. Use audio input from soundcard. In Python. Work under Windows. From an old code fftmorse.c . Use PyAudio and NCurses
This is the CW1 materials of Level 4 BIS student at WIUT - 00009115. Being private, this repository can be accessed by assessor only. The Report part of the CW can be accessed through the link below:
Simulates working Morse (CW), during Field Day.
Add a description, image, and links to the cw topic page so that developers can more easily learn about it.
To associate your repository with the cw topic, visit your repo's landing page and select "manage topics."