rcalix1 / Deep-learning-ML-and-tensorflow
Examples of linear regression, logistic regression, and deep learning implementations such as Transformers, gans, cnns, rnns, and more using Tensorflow. The code examples here are discussed in my books: Deep Learning Algorithms, and Getting Started with Deep Learning -->> Link.
☆95Updated 2 months ago
Alternatives and similar repositories for Deep-learning-ML-and-tensorflow:
Users that are interested in Deep-learning-ML-and-tensorflow are comparing it to the libraries listed below
- Hands-On Machine Learning for Cybersecurity, published by Packt☆192Updated 2 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆147Updated 2 years ago
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆364Updated 2 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆335Updated last year
- ☆15Updated 8 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆204Updated 11 months ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Updated 5 years ago
- Multi-class malware classification using Deep Learning☆77Updated 4 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- ☆29Updated 4 years ago
- Experiments to detect phishing websites using neural networks☆19Updated 5 years ago
- The resources stored in this repository cover data science topics applied to cybersecurity environments.☆23Updated 4 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 7 months ago
- ☆55Updated 6 years ago
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆15Updated 4 years ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆49Updated 3 years ago
- ☆17Updated 7 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- ☆59Updated 2 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆20Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆67Updated 3 years ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆130Updated last year
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 5 years ago
- Code and data for Cybersecurity Data Science on Udemy☆18Updated 5 years ago
- Code Repository for Machine Learning with Real World Projects, Published by Packt☆43Updated 2 years ago
- IBM Cybersecurity Analyst Assessment☆34Updated 4 years ago
- A simple command line tool that encrypts and decrypts files using AES encryption and stores the key in a separate file.☆8Updated last year
- This project contains files for cyber security☆34Updated 6 years ago