Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
ncnn is a high-performance neural network inference framework optimized for the mobile platform
ncnn is a high-performance neural network inference computing framework optimized for mobile platforms. ncnn is deeply considerate about deployment and uses on mobile phones from the beginning of design. ncnn does not have third-party dependencies. It is cross-platform and runs faster than all known open-source frameworks on mobile phone cpu. Developers can easily deploy deep learning algorithm models to the mobile platform by using efficient ncnn implementation, creating intelligent APPs, and bringing artificial intelligence to your fingertips. ncnn is currently being used in many Tencent applications, such as QQ, Qzone, WeChat, Pitu, and so on.
ncnn 是一个为手机端极致优化的高性能神经网络前向计算框架。 ncnn 从设计之初深刻考虑手机端的部署和使用。 无第三方依赖,跨平台,手机端 cpu 的速度快于目前所有已知的开源框架。 基于 ncnn,开发者能够将深度学习算法轻松移植到手机端高效执行, 开发出人工智能 APP,将 AI 带到你的指尖。 ncnn 目前已在腾讯多款应用中使用,如:QQ,Qzone,微信,天天 P 图等。
技术交流 QQ 群 637093648 (超多大佬) 答案:卷卷卷卷卷(已满) | Telegram Group | Discord Channel |
Pocky QQ 群(MLIR YES!) 677104663 (超多大佬) 答案:multi-level intermediate representation | ||
他们都不知道 pnnx 有多好用群 818998520 (新群!) |
https://github.com/Tencent/ncnn/releases/latest
how to build ncnn library on Linux / Windows / macOS / Raspberry Pi3, Pi4 / POWER / Android / NVIDIA Jetson / iOS / WebAssembly / AllWinner D1 / Loongson 2K1000 | ||
Source | ||
Android | ||
Android shared | ||
HarmonyOS | ||
HarmonyOS shared | ||
iOS | ||
iOS-Simulator | ||
macOS | ||
Mac-Catalyst | ||
watchOS | ||
watchOS-Simulator | ||
tvOS | ||
tvOS-Simulator | ||
visionOS | ||
visionOS-Simulator | ||
Apple xcframework | ||
Ubuntu 20.04 | ||
Ubuntu 22.04 | ||
VS2015 | ||
VS2017 | ||
VS2019 | ||
VS2022 | ||
WebAssembly | ||
Linux (arm) | ||
Linux (aarch64) | ||
Linux (mips) | ||
Linux (mips64) | ||
Linux (ppc64) | ||
Linux (riscv64) | ||
Linux (loongarch64) |
use ncnn with alexnet with detailed steps, recommended for beginners :)
ncnn 组件使用指北 alexnet 附带详细步骤,新人强烈推荐 :)
use netron for ncnn model visualization
ncnn param and model file spec
ncnn operation param weight table
how to implement custom layer step by step
Windows | Linux | Android | macOS | iOS | |
---|---|---|---|---|---|
intel-cpu | ✔️ | ✔️ | ❔ | ✔️ | / |
intel-gpu | ✔️ | ✔️ | ❔ | ❔ | / |
amd-cpu | ✔️ | ✔️ | ❔ | ✔️ | / |
amd-gpu | ✔️ | ✔️ | ❔ | ❔ | / |
nvidia-gpu | ✔️ | ✔️ | ❔ | ❔ | / |
qcom-cpu | ❔ | ✔️ | ✅ | / | / |
qcom-gpu | ❔ | ✔️ | ✔️ | / | / |
arm-cpu | ❔ | ❔ | ✅ | / | / |
arm-gpu | ❔ | ❔ | ✔️ | / | / |
apple-cpu | / | / | / | ✔️ | ✅ |
apple-gpu | / | / | / | ✔️ | ✔️ |
ibm-cpu | / | ✔️ | / | / | / |
https://github.com/mizu-bai/ncnn-fortran Call ncnn from Fortran
https://github.com/k2-fsa/sherpa Use ncnn for real-time speech recognition (i.e., speech-to-text); also support embedded devices and provide mobile Apps (e.g., Android App)
FAQs
ncnn is a high-performance neural network inference framework optimized for the mobile platform
We found that ncnn demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.