OCEChain / recursive_autoencoder
Recursive Autoencoder
☆9Updated 6 years ago
Alternatives and similar repositories for recursive_autoencoder:
Users that are interested in recursive_autoencoder are comparing it to the libraries listed below
- OCEChain erc20 token on Ethereum network☆15Updated 6 years ago
- ☆19Updated 6 years ago
- Spark Knn Recommender☆25Updated 6 years ago
- Denosing Autoencoder☆21Updated 6 years ago
- GM TLS/SSL Based on Golang☆20Updated 6 years ago
- A powerful blockchain wallet☆26Updated 5 years ago
- CMake toolchain and rules for building apps for Hexagon DSP and apps processor on Qualcomm SoCs☆10Updated 6 years ago
- Graph Convolutional Networks☆34Updated 6 years ago
- ☆45Updated 6 years ago
- AI (BlockChain + IoT)☆50Updated 6 years ago
- Online shopping mall☆37Updated 6 years ago
- ChainerRL is a deep reinforcement learning library built on top of Chainer.☆16Updated 6 years ago
- NTAPI Anti-Debugging Checker and Patcher is a Windows-based tool designed for research purposes, demonstrating how to detect and manipula…☆16Updated 7 months ago
- nexos source files made by @samdem-ai☆12Updated 5 months ago
- ☆378Updated 2 years ago
- AdGuardian is a powerful adblocker that efficiently blocks ads across various online platforms.☆12Updated last year
- ☆13Updated 6 months ago
- This is a malware that i used in it remote process injection technique, it scans for processes chooses the one you named and inject shell…☆17Updated 6 months ago
- React, TypeScript, Material-UI boilerplate by Welcome☆8Updated 2 years ago
- ☆14Updated 6 months ago
- A Windows string hashing toolkit for security research and malware analysis.Research implementation of malware-focused algorithms from V…☆14Updated 3 months ago
- This Malware is an application for MalwareEvasionTechniques repo .I used in it Registery staging in two modes R/W and I combined it with …☆14Updated 6 months ago
- Truechain Improvement Proposals and related documentation including roadmap☆26Updated 5 years ago
- ☆8Updated 2 years ago
- Implements dynamic Windows API resolution via hashing techniques to evade detection. Inspired by techniques mapped to MITRE ATT&CK T1055…☆16Updated 3 months ago
- Full reference of LinkedIn answers 2022 for skill assessments (aws-lambda, rest-api, javascript, react, git, html, jquery, mongodb, java,…☆6Updated 2 years ago
- Used Fuse_React Theme.☆9Updated 2 years ago
- Research in progress: A malware that abuses the GPU to accelerate the decryption process.☆20Updated last month
- A custom implementation of GetModuleHandle, often used in malware to evade detection by bypassing standard API resolution methods☆16Updated 3 months ago
- A custom implementation of GetProcAddress, often used in malware to evade detection by bypassing standard API resolution methods☆14Updated 3 months ago