program course for haidian fellowship
☆10Apr 15, 2021Updated 4 years ago
Alternatives and similar repositories for course
Users that are interested in course are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 该仓库整理收录了北大陈斌教授的《Python语言基础与应用》课程的相关习题答案☆11Jan 26, 2021Updated 5 years ago
- Code to compute Spillover Asymmetry Measure (SAM) introduced in Baruník, J., Kočenda, E. and Vácha, L., 2016. Asymmetric connectedness on…☆14Apr 6, 2019Updated 6 years ago
- 针对大模型的后门攻击☆12Jun 30, 2024Updated last year
- dga classification with fasttext☆12Oct 29, 2018Updated 7 years ago
- 点格棋以及其AI☆12Aug 29, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 系統程式System Programming SIC組譯器實作範例☆14Jun 11, 2019Updated 6 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Oct 2, 2020Updated 5 years ago
- K-means聚类算法实现图片的压缩,Python实现☆18Mar 19, 2018Updated 8 years ago
- ☆11Aug 30, 2021Updated 4 years ago
- PyTorch implementation of AdaCML☆11Apr 20, 2023Updated 2 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆13Dec 7, 2019Updated 6 years ago
- Detect webshells.☆11Aug 14, 2020Updated 5 years ago
- Indonesia's COVID-19 daily new cases prediction using LSTM-GCN method.☆15Oct 6, 2020Updated 5 years ago
- ☆42Oct 24, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning☆13Mar 24, 2023Updated 3 years ago
- A heterogeneous graph automatic meta-path learning method for drug-target interaction prediction☆14Aug 29, 2023Updated 2 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Classic snake in PowerShell console buffer.☆17Apr 14, 2017Updated 8 years ago
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 8 years ago
- ReSonate: A framework for runtime risk assessment of autonomous cyber-physical systems☆11Jul 4, 2021Updated 4 years ago
- Some solutions about kaggle compettions.☆16Jun 11, 2018Updated 7 years ago
- MilGNet: Deep Multiple Instance Learning on Heterogeneous Graph for Drug-disease Association Prediction☆16Nov 24, 2024Updated last year
- 每日蝦皮自動簽到☆13Jun 9, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆14Dec 21, 2018Updated 7 years ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- ☆20May 25, 2020Updated 5 years ago
- MiniBlog + ASP.NET Core + W3C.CSS☆24Feb 12, 2019Updated 7 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- ☆13Feb 7, 2023Updated 3 years ago
- tars2php转换工具☆12Apr 17, 2020Updated 5 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Joplin css profile☆19Feb 25, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Exploring internet domain names with deep learning using vector embeddings☆19Dec 14, 2018Updated 7 years ago
- Implementation of paper "Transferring Robustness for Graph Neural Network Against Poisoning Attacks".☆20Feb 26, 2020Updated 6 years ago
- 哈尔滨工业大学《数据结构与算法》2016年秋季课程代码☆13Nov 4, 2017Updated 8 years ago
- Behavorial analysis of malware using machine learning☆16Mar 13, 2018Updated 8 years ago
- collect☆18Mar 29, 2020Updated 5 years ago
- First two front-end phases of a language-independent compiler implemented in C++☆14Jul 27, 2020Updated 5 years ago
- demo for detecting webshell with cnn☆16Apr 25, 2019Updated 6 years ago