rcalix1 / Deep-learning-ML-and-tensorflow
Examples of linear regression, logistic regression, and deep learning implementations such as Transformers, gans, cnns, rnns, and more using Tensorflow. The code examples here are discussed in my books: Deep Learning Algorithms, and Getting Started with Deep Learning -->> Link.
☆91Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Deep-learning-ML-and-tensorflow
- Hands-On Machine Learning for Cybersecurity, published by Packt☆188Updated last year
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆140Updated last year
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆357Updated last year
- ☆15Updated 7 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆62Updated 3 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆319Updated last year
- A machine learning based Intrusion Detection System☆121Updated 4 years ago
- ☆59Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆15Updated 4 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆97Updated 4 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆196Updated 6 months ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆30Updated last year
- Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased …☆45Updated 5 years ago
- Multi-class malware classification using Deep Learning☆73Updated 4 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆43Updated 7 years ago
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆14Updated 4 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆67Updated 2 years ago
- Modern water distribution systems rely on computers, sensors and actuators for both monitoring and operational purposes. This combination…☆21Updated 5 years ago
- Experiments to detect phishing websites using neural networks☆18Updated 4 years ago
- ☆17Updated 6 years ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆47Updated 3 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆99Updated 7 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆19Updated 3 months ago
- ChatGPT for Cybersecurity Cookbook, published by Packt☆100Updated 7 months ago
- ☆67Updated last year
- It's a Git Repo containing source code, supported docker files, multiple linear regression pickle file and other related contents of Flas…☆27Updated last year
- Anomaly based Malware Detection using Machine Learning (PE and URL)☆105Updated 2 months ago
- This repository includes supervised and unsupervised machine learning methods which are used to detect anomalies on network datasets. Dec…☆17Updated 5 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Updated 5 years ago