A Tensorflow implementation of Representation Learning by Learning to Count
☆107Sep 17, 2017Updated 8 years ago
Alternatives and similar repositories for Representation-Learning-by-Learning-to-Count
Users that are interested in Representation-Learning-by-Learning-to-Count are comparing it to the libraries listed below
Sorting:
- A Tensorflow implementation of Feature Control as Intrinsic Motivation for Hierarchical Reinforcement Learning☆32Oct 12, 2017Updated 8 years ago
- Tensorflow implementation of Generative Latent Optimization (GLO) proposed by Facebook AI Research☆95Aug 11, 2017Updated 8 years ago
- A Tensorflow implementation of Cycle-Consistent Adversarial Networks.☆26Jul 12, 2017Updated 8 years ago
- Pytorch implementation of "Forward Thinking: Building and Training Neural Networks One Layer at a Time"☆65Jun 14, 2017Updated 8 years ago
- personal notes☆56Jul 29, 2017Updated 8 years ago
- A Tensorflow implementation of BicycleGAN.☆101Oct 29, 2018Updated 7 years ago
- Tensorflow implementations of Relational Networks and a VQA dataset named Sort-of-CLEVR proposed by DeepMind.☆321Dec 1, 2018Updated 7 years ago
- ☆25Sep 7, 2017Updated 8 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- ☆54Sep 12, 2018Updated 7 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆45Apr 25, 2017Updated 8 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- RWA in pytorch☆14May 7, 2017Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Question Dependent Recurrent Entity Network☆13Sep 21, 2017Updated 8 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 5 months ago
- ☆13Feb 17, 2018Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Writing a 32-bit Protected Mode OS in NASM☆13Jun 22, 2012Updated 13 years ago
- spy windows ce API calls☆11Jun 3, 2014Updated 11 years ago
- Training scripts for paper Miceli Barone et al. 2017 "Deep Architectures for Neural Machine Translation"☆11Jul 13, 2017Updated 8 years ago
- Author's implementation of 'Unsupervised Visual Representation Learning by Context Prediction'☆119May 25, 2017Updated 8 years ago
- Web based application for managing your Sourcemod servers and users☆13Aug 8, 2014Updated 11 years ago
- Tensorflow implementation for DilatedRNN☆354Oct 24, 2017Updated 8 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago