rcalix1 / Deep-learning-ML-and-tensorflow
Examples of linear regression, logistic regression, and deep learning implementations such as Transformers, gans, cnns, rnns, and more using Tensorflow. The code examples here are discussed in my books: Deep Learning Algorithms, and Getting Started with Deep Learning -->> Link.
☆93Updated last month
Alternatives and similar repositories for Deep-learning-ML-and-tensorflow:
Users that are interested in Deep-learning-ML-and-tensorflow are comparing it to the libraries listed below
- Hands-On Machine Learning for Cybersecurity, published by Packt☆191Updated 2 years ago
- Machine Learning For Cybersecurity.☆64Updated 5 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆146Updated 2 years ago
- Predicting Internet of Things(IoT) Malware Attacks. Door Bells, Thermostats, Baby Monitors, Web Cameras, and Security Cameras attacked by…☆14Updated 3 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆361Updated 2 years ago
- Multi-class malware classification using Deep Learning☆76Updated 4 years ago
- ☆55Updated 6 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆330Updated last year
- ☆58Updated 2 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆21Updated 6 months ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 3 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆47Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆203Updated 9 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 2 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆65Updated 3 years ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆49Updated 3 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased …☆49Updated 5 years ago
- My Projects Submission to Udacity's Deep Learning Nanodegree Program☆16Updated 4 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Updated 5 years ago
- ☆29Updated 4 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 5 years ago
- Implementation of reinforcement learning algorithms in a cyber security simulation. Autonomous and Adaptive Systems (University of Bologn…☆8Updated 4 years ago
- A Machine Learning Model to classify samples as XSS (Cross Site-Scrtpting)☆27Updated last year
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆123Updated last year
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆75Updated 8 years ago
- ☆74Updated 6 years ago
- ☆17Updated 7 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆101Updated 5 years ago