An AI engineer Prepares / 算法工程师自我修养
☆35Aug 28, 2023Updated 2 years ago
Alternatives and similar repositories for Courses
Users that are interested in Courses are comparing it to the libraries listed below
Sorting:
- Fitting stochastic blockmodels to graphs☆17Jul 8, 2016Updated 9 years ago
- Lab assignments for 6.826☆11Nov 8, 2019Updated 6 years ago
- Exploiting SNP correlations within Random Forest for Genome-Wide Association Studies☆13Oct 20, 2014Updated 11 years ago
- Projects from the Robotics specialization from Coursera offered by the University of Pennsylvania☆19Jun 6, 2023Updated 2 years ago
- Teaching a Convolutional Neural Network to recognize painting genre. Handcrafted dataset. Cool visualizations.☆10Dec 19, 2018Updated 7 years ago
- NetPy '19: Introduction to Network Analysis in Python☆16Dec 10, 2019Updated 6 years ago
- ☆11Dec 8, 2022Updated 3 years ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- ☆10Nov 17, 2025Updated 4 months ago
- Notes for EE364a - Convex Optimization I @ Stanford (will update Ch 6 - Ch 13 later)☆11Jul 30, 2019Updated 6 years ago
- ☆10Nov 29, 2023Updated 2 years ago
- 3D Slicer module for browsing and downloading medical imaging collections from The Cancer Imaging Archive (TCIA).☆19Oct 24, 2025Updated 4 months ago
- ☆11Mar 5, 2021Updated 5 years ago
- Stop the maintenance☆11Feb 28, 2022Updated 4 years ago
- Process documentation and rationale for implementing the flipped interview model☆13Jul 15, 2018Updated 7 years ago
- A package to simplify common tasks one might perform when interacting with The Cancer Imaging Archive (TCIA) via Python.☆26Oct 24, 2025Updated 4 months ago
- Data structures implementations using C (linked list, hashmap, trees, tries...)☆18Aug 13, 2019Updated 6 years ago
- For easy metric logging and visualization☆14Jan 31, 2025Updated last year
- ☆13Sep 14, 2022Updated 3 years ago
- ☆10Aug 7, 2021Updated 4 years ago
- Understanding the Robustness of Skeleton-based Action Recognition under Adversarial Attack CVPR 2021☆14Mar 8, 2024Updated 2 years ago
- IITK CSE 5th semester course materials, lecture notes, assignments, and resources for CS-330, CS-340, CS-345, CS-771, and ESO-201☆11Aug 20, 2025Updated 7 months ago
- Lab assignments for 6.826☆17Oct 20, 2020Updated 5 years ago
- ☆10Mar 22, 2021Updated 4 years ago
- A Deep Reinforcement Learning Library for Automated Trading in Quantitative Finance. NeurIPS 2020. Please star. 🔥☆12Mar 13, 2023Updated 3 years ago
- Reproduces BPDA attack in pytorch☆13Oct 10, 2019Updated 6 years ago
- MCMC tools for Julia☆36Apr 16, 2013Updated 12 years ago
- A 45 days DSA challenge☆13Jul 19, 2024Updated last year
- End-to-End ELT data pipeline with Postgres, Airbyte, dbt, Dagster, Snowflake and Metabase☆11Jul 13, 2023Updated 2 years ago
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆20Jul 30, 2024Updated last year
- Flink 中文社区文章整理☆13Jun 3, 2020Updated 5 years ago
- CSC403: Computer Organization and Architecture [COA] & CSL403: Processor Architecture Lab [PAL] | SE Semester IV | Computer Engineering☆19Feb 20, 2026Updated last month
- Programming labs for 6.S060 (Foundations of Computer Security).☆15Nov 19, 2021Updated 4 years ago
- This course talks about networks flows which are used in more obvious applications such as optimal matchings, finding disjoint paths and …☆24Aug 19, 2018Updated 7 years ago
- Solves Mazes taking an image input, along with the starting and ending points. There are two Algorithms here which solve mazes. One of th…☆18Nov 21, 2023Updated 2 years ago
- Prolog programs for Mathematical Logic for Computer Science (3rd Edition)☆17Nov 23, 2022Updated 3 years ago
- Conference poster made in .SVG with Inkscape☆18Feb 15, 2016Updated 10 years ago
- BASAR:Black-box Attack on Skeletal Action Recognition, CVPR 2021☆20Feb 18, 2025Updated last year
- Stochastic Block Models - generate, detect, and recover☆22Aug 14, 2016Updated 9 years ago