Learning tutorial for machine learning beginners
☆16May 14, 2022Updated 3 years ago
Alternatives and similar repositories for Awesome-Machine-Learning
Users that are interested in Awesome-Machine-Learning are comparing it to the libraries listed below
Sorting:
- ☆37Mar 16, 2022Updated 3 years ago
- github军火库☆21May 24, 2017Updated 8 years ago
- ☆10Jun 18, 2020Updated 5 years ago
- ☆16Dec 1, 2024Updated last year
- IRIS Module for Wazuh-Indexer Searching☆11Nov 24, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Cheatsheets and clear roadmaps, empowering your learning journey with essential information at your fingertips.☆11Dec 2, 2023Updated 2 years ago
- Implementation of MobileViT in TensorFlow and Keras☆13Nov 16, 2022Updated 3 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- ☆13Mar 24, 2020Updated 5 years ago
- Notes for my CISSP study☆10Aug 5, 2022Updated 3 years ago
- Code for Visual Information Hiding Based on Obfuscating Adversarial Perturbations☆13Jan 9, 2024Updated 2 years ago
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Oct 18, 2025Updated 4 months ago
- ☆13Apr 8, 2019Updated 6 years ago
- A simple PyTorch implementations of `Badnets: Identifying vulnerabilities in the machine learning model supply chain` on MNIST and CIFAR1…☆10May 19, 2021Updated 4 years ago
- An exploration of observability for Kafka client applications☆13Apr 26, 2022Updated 3 years ago
- Simple image-captioning model using Flickr8K dataset☆15Mar 17, 2022Updated 3 years ago
- Coverage gathering JVMTI agent for Android☆26Oct 11, 2023Updated 2 years ago
- pwn☆12Apr 7, 2019Updated 6 years ago
- A curated list of awesome privacy preserving machine learning resources☆14May 17, 2020Updated 5 years ago
- ☆11Mar 27, 2022Updated 3 years ago
- 南京大学软件学院操作系统2019届加分项☆11Jun 18, 2018Updated 7 years ago
- Python/Flask based template Web UI☆16Feb 8, 2021Updated 5 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- ☆13Apr 30, 2023Updated 2 years ago
- Game recommendation engine built with React and PyTorch. Facebook Developer Circle Hackathon Local Language Winner.☆17Jun 22, 2021Updated 4 years ago
- 该项目实现了隐私保护和可验证的卷积神经网络(CNN)测试,旨在使模型开发者能够在多个测试者提供的非公开数据上向用户证明CNN性能的真实性,同时保护模型和数据的隐私。☆15Oct 23, 2023Updated 2 years ago
- Notes about Computer vision and implementation of image-processing, face-detection, face-recognition, and character optical recognition a…☆18Sep 5, 2022Updated 3 years ago
- 针对《解密家用路由器0day漏洞挖掘技术》一书的相关笔记☆16Oct 12, 2020Updated 5 years ago
- Benchmarking framework for Feature Selection and Feature Ranking algorithms 🚀☆19Apr 12, 2023Updated 2 years ago
- Distributed solver library for large-scale structured output prediction, based on Spark. Project website:☆17Mar 3, 2016Updated 10 years ago
- 赛尔号与python:登陆器,强化学习等☆20Aug 30, 2021Updated 4 years ago
- ☆18Dec 31, 2023Updated 2 years ago
- Hunt and Analyze Tor Onion Sites☆23Dec 8, 2022Updated 3 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- Issue tracker for the Sourcegraph app - a lightweight single-binary version of Sourcegraph for your local machine☆27Feb 2, 2024Updated 2 years ago
- 子域名收集、目录爆破、网站指纹识别、sql注入检测、端口扫描☆17Apr 4, 2019Updated 6 years ago
- Convert Description Logic axioms into a graph, and generate embedding representation for the nodes.☆19Mar 5, 2023Updated 3 years ago