yandexdataschool / ML-Handbook-materialsView external linksLinks
Notebooks and other media for ML Handbook
☆26Nov 1, 2021Updated 4 years ago
Alternatives and similar repositories for ML-Handbook-materials
Users that are interested in ML-Handbook-materials are comparing it to the libraries listed below
Sorting:
- app examples for the cv course☆15Nov 29, 2025Updated 2 months ago
- Modified Arena-Hard-Auto LLM evaluation toolkit with an emphasis on Russian language☆46Mar 20, 2025Updated 10 months ago
- ☆56May 1, 2025Updated 9 months ago
- ☆22Oct 4, 2023Updated 2 years ago
- ☆410Oct 23, 2024Updated last year
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last week
- An overview of cases, public datasets, books and academic papers related to applying ML in industrial applications☆116May 27, 2025Updated 8 months ago
- Reinforcement Learning Library.☆29Aug 16, 2022Updated 3 years ago
- Effective LLM Alignment Toolkit☆152Jun 25, 2025Updated 7 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- Vehicle templates with multibody suspension and electric powertrain sized for Formula Student competitions.☆14Jan 29, 2026Updated 2 weeks ago
- ☆10Jan 16, 2024Updated 2 years ago
- GPT prepping certificates of translation☆11Jan 27, 2024Updated 2 years ago
- gcnano-binaries☆11Nov 27, 2025Updated 2 months ago
- A command-line DSL budget manager☆13Oct 25, 2022Updated 3 years ago
- Analyzing the most strategic words to guess on Wordle, based on letter frequency distributions☆11Feb 20, 2022Updated 3 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Formula Student FEUP Autonomous Systems Department Repository☆23Feb 8, 2026Updated last week
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆15Updated this week
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- ☆11Jun 2, 2015Updated 10 years ago
- GOST-34.11-2012 (Stribog) hash-function☆11May 12, 2015Updated 10 years ago
- Super Resolution Gaming Dataset☆11Jan 5, 2025Updated last year
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- ☆11Apr 20, 2024Updated last year
- ☆12Nov 30, 2023Updated 2 years ago
- DockApp for NUT (Network UPS Tools)☆11Jan 4, 2026Updated last month
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- hardware interface for PWM servos through Raspberry Pi's GPIO pins compatible with ros2_control framework☆11Jun 21, 2023Updated 2 years ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- Bunch of notebooks for pre-training custom Saiga-like LLM☆12Feb 9, 2024Updated 2 years ago
- ☆11Aug 23, 2024Updated last year
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 5 years ago
- [IROS 2025] ReBot: Scaling Robot Learning with Real-to-Sim-to-Real Robotic Video Synthesis☆20May 17, 2025Updated 8 months ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Cyprus road signs test☆14Jun 7, 2025Updated 8 months ago
- Personal implementation of the SASRec model.☆10May 2, 2023Updated 2 years ago
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆12May 1, 2020Updated 5 years ago