Abstract: Deep learning models are highly susceptible to adversarial attacks, where subtle perturbations in the input images lead to misclassifications. Adversarial examples typically distort specific ...
The previous article Using Tesseract for Image Text Recognition introduced how to install TesseractOCR and use it via the command line. However, using the command line in daily tasks can be ...
起因是公司最近更换了 GitLab 域名,面对几十个本地仓库,手动修改 git remote 地址既繁琐又容易出错。 为了解决这个问题,我花了 5 个小时写了这个工具。借助于 Rust 的高性能和 Tauri 的小体积 ...