☆15Dec 15, 2022Updated 3 years ago
Alternatives and similar repositories for adjunct-courses
Users that are interested in adjunct-courses are comparing it to the libraries listed below
Sorting:
- IIIT Kottayam Technical Fest Website.☆11Nov 9, 2021Updated 4 years ago
- Geojsons of India and States, union territories of India☆15May 6, 2020Updated 5 years ago
- Spatial Transformer Network YOLO Model for Agricultural Object Detection☆18Sep 18, 2024Updated last year
- ☆15Jan 20, 2023Updated 3 years ago
- Skin Cancer Object Detection-YOLOv5-YOLOv8☆15Jun 5, 2024Updated last year
- A personal money management web app☆18Nov 19, 2024Updated last year
- 🚀 Leveraging advanced RNN with LSTM for efficient, real-time anomaly detection in IoT networks, optimized for performance in resource-co…☆13Nov 25, 2023Updated 2 years ago
- ☆16Dec 28, 2024Updated last year
- ☆13Dec 31, 2024Updated last year
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- 🤗 If you like it, Star it 🌟☆16Feb 20, 2026Updated last week
- This is a paper implementation of IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 6, NOVEMBER 2014 on Electric Vehicle Charging Station Plac…☆21Sep 23, 2019Updated 6 years ago
- Use Text to SQL to analyze US Government contract data☆23Mar 29, 2025Updated 11 months ago
- Using Flower federated learning with scikit-learn random forest☆17Nov 28, 2023Updated 2 years ago
- 🐌 Detect cyclomatic complexity of your JavaScript and TypeScript code☆22Oct 5, 2024Updated last year
- ☆22Oct 22, 2024Updated last year
- Hacktoberfest 2022🎉 Guys, open your 1st pull request and contribute in an open-source community...!! This is for everyone💯 So, Hurry up…☆23Apr 15, 2024Updated last year
- This is a repository for all the writeups of CTFs organized by us.☆22Mar 5, 2025Updated 11 months ago
- Challenges used in CUCTF 2019☆25Oct 13, 2019Updated 6 years ago
- ☆35Apr 8, 2021Updated 4 years ago
- Federated Learning for Intrusion Detection System using the Flower framework and UNSW_NB15 dataset.☆30Jan 13, 2024Updated 2 years ago
- Repo for SemStamp (NAACL2024) and k-SemStamp (ACL2024)☆27Dec 9, 2024Updated last year
- Write up of solutions to the picoCTF 2023 capture the flag (CTF) event from my submissions during the competition.☆30May 26, 2023Updated 2 years ago
- IoT Attack Detection with machine learning☆30Jun 12, 2025Updated 8 months ago
- A small and static notes taking website.☆22Dec 29, 2025Updated 2 months ago
- ns-3 simulation codes☆28Apr 23, 2022Updated 3 years ago
- Cybersecurity Resources☆59Oct 6, 2024Updated last year
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- Public Code for ICS Evasion Attack Generation☆44Apr 23, 2021Updated 4 years ago
- Womanium Quantum+AI 2024 Projects☆38Jun 29, 2024Updated last year
- Personal site☆41Dec 12, 2023Updated 2 years ago
- Create CFGs and compute complexity metrics for Python, C++, and Java code.☆43May 10, 2024Updated last year
- PyTorch and TensorFlow/Keras image models with automatic weight conversions and equal API/implementations - Vision Transformer (ViT), Res…☆42Jul 1, 2023Updated 2 years ago
- A custom red + black themed rice!☆40May 26, 2025Updated 9 months ago
- Talks at PyData Delhi Meetups☆46Sep 13, 2017Updated 8 years ago
- ☆53Nov 3, 2025Updated 3 months ago
- A template portfolio for you to use☆53Oct 27, 2023Updated 2 years ago
- Guide to buffer overflows☆60Sep 3, 2021Updated 4 years ago
- HackLiners: CyberSec/BugHunting OneLiners☆62Oct 16, 2024Updated last year