Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
HugsVision is an open-source and easy to use all-in-one huggingface wrapper for computer vision.
The goal is to create a fast, flexible and user-friendly toolkit that can be used to easily develop state-of-the-art computer vision technologies, including systems for Image Classification, Semantic Segmentation, Object Detection, Image Generation, Denoising and much more.
⚠️ HugsVision is currently in beta. ⚠️
HugsVision is constantly evolving. New features, tutorials, and documentation will appear over time. HugsVision can be installed via PyPI to rapidly use the standard library. Moreover, a local installation can be used by those users than want to run experiments and modify/customize the toolkit. HugsVision supports both CPU and GPU computations. For most recipes, however, a GPU is necessary during training. Please note that CUDA must be properly installed to use GPUs.
conda create --name HugsVision python=3.6 -y
conda activate HugsVision
More information on managing environments with Anaconda can be found in the conda cheat sheet.
Once you have created your Python environment (Python 3.6+) you can simply type:
pip install hugsvision
Once you have created your Python environment (Python 3.6+) you can simply type:
git clone https://github.com/qanastek/HugsVision.git
cd HugsVision
pip install -r requirements.txt
pip install --editable .
Any modification made to the hugsvision
package will be automatically interpreted as we installed it with the --editable
flag.
Let's train a binary classifier that can distinguish people with or without Pneumothorax
thanks to their radiography.
Steps:
cd recipes/pneumothorax/binary_classification/
process.py
script.python train_example_vit.py --imgs="./pneumothorax_binary_classification_task_data/" --name="pneumo_model_vit" --epochs=1
<MODEL_PATH>/config.json
to <MODEL_PATH>/preprocessor_config.json
in my case, the model is situated at the output path like ./out/MYVITMODEL/1_2021-08-10-00-53-58/model/
python predict.py --img="42.png" --path="./out/MYVITMODEL/1_2021-08-10-00-53-58/model/"
You can find all the currently available models or tasks under the recipes/
folder.
You can try some of the models or tasks on HuggingFace thanks to theirs amazing spaces :
All the model checkpoints provided by 🤗 Transformers and compatible with our tasks can be seamlessly integrated from the huggingface.co model hub where they are uploaded directly by users and organizations.
Before starting implementing, please check if your model has an implementation in PyTorch
by refering to this table.
🤗 Transformers currently provides the following architectures for Computer Vision:
Build: python setup.py sdist bdist_wheel
Upload: twine upload dist/*
If you want to cite the tool you can use this:
@misc{HugsVision,
title={HugsVision},
author={Yanis Labrak},
publisher={GitHub},
journal={GitHub repository},
howpublished={\url{https://github.com/qanastek/HugsVision}},
year={2021}
}
FAQs
A easy to use huggingface wrapper for computer vision.
We found that hugsvision demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.