Recurrent Neural Networks With Limited Numerical Precision
☆13May 25, 2017Updated 8 years ago
Alternatives and similar repositories for QuantizedRNN
Users that are interested in QuantizedRNN are comparing it to the libraries listed below
Sorting:
- ☆11Apr 30, 2016Updated 9 years ago
- An implmentation of the AWD-LSTM in PyTorch☆12Feb 27, 2019Updated 7 years ago
- ☆16May 25, 2019Updated 6 years ago
- Source code for ``Neural Networks with Few Multiplications'' published at ICLR 2016☆80Apr 28, 2016Updated 9 years ago
- ☆12Mar 21, 2024Updated last year
- Platform + GUI for hyperparameter optimization of recurrent neural networks (MATLAB).☆10Dec 29, 2021Updated 4 years ago
- Training RNNs as fast as CNNs. An unofficial tensorflow implementation.☆33Feb 23, 2018Updated 8 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Custom Keras layers for implementing multi-dimensional recurrent neural networks (MDRNNs) described in Alex Graves's paper https://arxiv.…☆10Apr 27, 2020Updated 5 years ago
- The Statistical Recurrent Unit in Pytorch☆34Sep 19, 2017Updated 8 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- parallel corpora for any languages supported by glosbe.com☆10Feb 9, 2016Updated 10 years ago
- Example code - use word embeddings to make emoji prediction smarter with context☆11Sep 14, 2018Updated 7 years ago
- Grapheme to phoneme converter for Estonian☆14May 27, 2021Updated 4 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- Unbounded cache model for online language modeling with open vocabulary☆11Feb 15, 2019Updated 7 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- 随机扒取古诗文词语作为git的commit msg☆11Jan 16, 2017Updated 9 years ago
- ☆13Oct 3, 2025Updated 4 months ago
- datetime模块的C语言实现,《奔跑吧,Python君》系列相关代码☆10Apr 30, 2023Updated 2 years ago
- Deep neural network inference transpiler tool for tflite and NNAPI☆12Jul 16, 2018Updated 7 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago
- The official repository of the Eesen project☆12Jun 20, 2018Updated 7 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- State-Regularized Recurrent Neural Networks☆11Sep 20, 2019Updated 6 years ago
- Pytorch implementations of GMM - HMM☆11Dec 28, 2020Updated 5 years ago
- Spectral RNNs with adaptive window learning in TensorFlow, ICANN 2020.☆10Sep 20, 2021Updated 4 years ago
- A PyTorch implement of Dilated RNN☆11Dec 31, 2017Updated 8 years ago
- ☆13Aug 31, 2024Updated last year
- MATLAB toolbox for performing modal analysis using experimental data☆11Jun 23, 2022Updated 3 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago