☆19Jul 5, 2023Updated 2 years ago
Alternatives and similar repositories for AI_Course
Users that are interested in AI_Course are comparing it to the libraries listed below
Sorting:
- A computation-parallel deep learning architecture.☆13Sep 25, 2019Updated 6 years ago
- ☆18Mar 12, 2024Updated 2 years ago
- Repo. for IPSN 2022 paper: "BalanceFL: Addressing Class Imbalance in Long-Tail Federated Learning".☆22Jul 22, 2022Updated 3 years ago
- Federated Learning Algorithm (Pytorch) : FedAvg, FedProx, MOON, SCAFFOLD, FedDyn☆27Nov 6, 2024Updated last year
- Implementation of Domain adaptation on PACS dataset using a modified version of Alexnet.☆26Oct 16, 2021Updated 4 years ago
- (SIGKDD 2022) Connected Low-Loss Subspace Learning for a Personalization in Federated Learning (https://arxiv.org/abs/2109.07628)☆31Jul 18, 2024Updated last year
- edge computing with reinforcement learning☆21Mar 29, 2023Updated 2 years ago
- System-on-Chip Resource Adaptive Scheduling using Deep Reinforcement Learning☆15Nov 2, 2022Updated 3 years ago
- LotteryFL: Empower Edge Intelligence with Personalized and Communication-Efficient Federated Learning (2021 IEEE/ACM Symposium on Edge Co…☆43Nov 16, 2022Updated 3 years ago
- This is the code for paper "Scalable Resource Management for Dynamic MEC: An Unsupervised Link-Output Graph Neural Network Approach"☆28Oct 7, 2023Updated 2 years ago
- An implementation of ICML 2017 paper <<Neural Optimizer Search with Reinforcement Learning>> https://arxiv.org/abs/1709.07417☆15Mar 4, 2018Updated 8 years ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- This is the dataset for UrbanRadio3D which is accepted by IEEE TNSE.☆28Dec 6, 2025Updated 3 months ago
- This repository serves as a curated collection of outstanding papers and code related to learning-based radio maps (RM), also referred to…☆29Jan 28, 2026Updated last month
- ☆17Jul 2, 2022Updated 3 years ago
- This repository contains an attempt at using Graph Attention based Reinforcement Learning for graphical state space. The code also provid…☆10Jun 27, 2021Updated 4 years ago
- Deep Reinforcement Learning Environments for User-Centric Mobile Edge Computing☆28Mar 22, 2024Updated last year
- a dataset for CKM☆30Feb 6, 2026Updated last month
- ☆26Oct 9, 2025Updated 5 months ago
- Q learning and DQN☆10Mar 14, 2022Updated 4 years ago
- Demo code of "EMS-GCN: An End-to-End Mixhop Superpixel-Based Graph Convolutional Network for Hyperspectral Image Classification"☆16Sep 27, 2024Updated last year
- Implementation of the paper "Model Free Training of End-to-End Communication Systems"☆16Aug 6, 2022Updated 3 years ago
- This is the code for the work accepted by ICRA2022.☆19Jun 20, 2022Updated 3 years ago
- ☆25Feb 25, 2023Updated 3 years ago
- 公考awesome的课程、网站、app、资料等等☆16Jun 9, 2022Updated 3 years ago
- A real-time workflow scheduling system in a cloud computing environment with a deep reinforcement learning approach☆29May 13, 2022Updated 3 years ago
- Minimum Energy Resource Allocation Strategy with partial offloading☆10Jan 17, 2022Updated 4 years ago
- Aiwac智能药盒微信小程序☆10Sep 13, 2021Updated 4 years ago
- Deep feature enhancement method for land cover with irregular and sparse spatial distribution features: a case study on open-pit mining☆15Feb 24, 2023Updated 3 years ago
- This is the code for paper "SigT: An Efficient End-to-End MIMO-OFDM Receiver Framework Based on Transformer"☆31May 18, 2022Updated 3 years ago
- ☆36Dec 11, 2022Updated 3 years ago
- ☆28Mar 20, 2021Updated 5 years ago
- (NeurIPS 2022) Official Implementation of "Preservation of the Global Knowledge by Not-True Distillation in Federated Learning"☆90Feb 24, 2023Updated 3 years ago
- Implimenting DDPG Algorithm in Tensorflow-2.0☆10Mar 25, 2023Updated 2 years ago
- ☆10Feb 28, 2021Updated 5 years ago
- A Robust Adversarial Network-Based End-to-End Communications System With Strong Generalization Ability Against Adversarial Attacks☆19Jan 21, 2022Updated 4 years ago
- 抓取大量免费代理 ip,提取有效 ip 使用☆12Feb 13, 2017Updated 9 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 5 years ago
- ☆23Dec 16, 2022Updated 3 years ago