abstractguy / LSTMLinks
Long Short-Term Memory implementation from scratch
☆28Updated 7 years ago
Alternatives and similar repositories for LSTM
Users that are interested in LSTM are comparing it to the libraries listed below
Sorting:
- Antivirus Demo for Fresh Machine Learning #7☆107Updated 5 years ago
- C++ console application that features unique (at least I think so) symmetric key based file encryption algorithm.☆53Updated 3 years ago
- Six snippets of code that made deep learning what it is today.☆262Updated 6 years ago
- A fairly quick data structure for matching a string against a large list of patterns.☆35Updated 4 months ago
- Demo Spectre with 70 lines code☆126Updated 7 years ago
- Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.☆21Updated 9 years ago
- Learning the Enigma with Recurrent Neural Networks☆162Updated 3 years ago
- Cool trick to store 4 5-bit values in one 16-bit value.☆285Updated 5 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- Unsupervised ML algorithm for predictive modeling and time-series analysis☆39Updated 5 years ago
- Generate strong passwords using /dev/urandom 👻☆15Updated 8 years ago
- An experimental cryptographic virtual machine☆14Updated 8 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 7 months ago
- Lightweight C++11 library for building deep recurrent neural networks☆43Updated 8 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- This is the code for "How Does Monero Work?" By Siraj Raval on Youtube☆31Updated 7 years ago
- Source code for the article "A bug story: data alignment on x86"☆17Updated 8 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- A tool for scraping tweet ids from the Twitter website.☆31Updated 8 years ago
- Mirror of http://sourceforge.net/p/safeclib/code/ci/master/tree/☆15Updated 10 years ago
- Parses DNS responses in a secure, rigorous manner☆21Updated 5 years ago
- [ICML 2017] TensorFlow code for Curiosity-driven Exploration for Deep Reinforcement Learning☆28Updated 7 years ago
- Socket programming tutorials in C, python, perl, java, winsock☆29Updated 12 years ago
- An analysis of historical Hacker News data to determine the ranking algorithm☆85Updated 8 years ago
- Classify spambase dataset: https://archive.ics.uci.edu/ml/datasets/Spambase☆23Updated 9 years ago
- Docker configs and build scripts.☆22Updated 10 years ago
- A solver for GCHQ's christmas card puzzle☆12Updated 9 years ago
- Spying using Smartwatch and Deep Learning☆187Updated 8 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- This is the code for "Dynamic Programming" by Siraj Raval on Youtube☆52Updated 6 years ago