rcalix1 / Deep-learning-ML-and-tensorflow
Examples of linear regression, logistic regression, and deep learning implementations such as Transformers, gans, cnns, rnns, and more using Tensorflow. The code examples here are discussed in my books: Deep Learning Algorithms, and Getting Started with Deep Learning -->> Link.
☆95Updated 2 months ago
Alternatives and similar repositories for Deep-learning-ML-and-tensorflow:
Users that are interested in Deep-learning-ML-and-tensorflow are comparing it to the libraries listed below
- Hands-On Machine Learning for Cybersecurity, published by Packt☆194Updated 2 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆147Updated 2 years ago
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 7 months ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆335Updated last year
- ☆17Updated 7 years ago
- ☆15Updated 8 years ago
- ☆59Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆204Updated 11 months ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆49Updated 3 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆364Updated 2 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆103Updated 5 years ago
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆15Updated 4 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 5 years ago
- Multi-class malware classification using Deep Learning☆77Updated 4 years ago
- A machine learning based Intrusion Detection System☆137Updated 5 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆12Updated 6 years ago
- Deep Learning Specialization Course by Coursera. Neural Networks, Deep Learning, Hyper Tuning, Regularization, Optimization, Data Process…☆91Updated 4 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆20Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆67Updated 4 years ago
- Public datasets to help you address various cyber security problems.☆411Updated 3 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Updated 7 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆12Updated 2 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆37Updated 4 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Updated 5 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- ☆12Updated 5 years ago
- ☆31Updated 4 years ago