alexzzlin Goto Github PK
Name: Alex Lin
Type: User
Location: North America
Name: Alex Lin
Type: User
Location: North America
This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model realization, and performance evaluation.
Code and hyperparameters for the paper "Generative Adversarial Networks"
Example Meme Propagation
An open-source NLP research library, built on PyTorch.
Officially supported AllenNLP models
Adaptive Propagation Graph Convolutional Network
scripts for 688
Adversarial attacks and defenses on Graph Neural Networks.
Tutorial for Chinese Sentiment analysis with hotel review data
An adversarial example library for constructing attacks, building defenses, and benchmarking both
Convolutional Neural Network exercise code and supporting documents.
Compilation of R and Python programming codes on the Data Professor YouTube channel.
CS281 Final Project to develop a new ML Model for predicting incidents of crime.
Creates a data pipeline from the Famine Land Data Assimilation DataSet (FLDAS) to seed model terrain and assess the potential crop yield for a variety of crops.
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable file, we can gather data such as date of creation, variable names used, and what library calls are imported. This information can be used as features for attribution analysis. We need to extract the features from malware that can be used for attribution and analyse them using some technique to attribute the attacks.
Data Sets for Machine Learning Practice
This repo houses works from taking Data Science Specialization at JHU.
Network Intrusion Detection System using Deep Learning Techniques
Source Code for 'Designing a Machine Learning Intrusion Detection System' (video) by Emmanuel Tsukerman
Official implementation of "Learning to Discover Cross-Domain Relations with Generative Adversarial Networks"
PyTorch implementation of "Learning to Discover Cross-Domain Relations with Generative Adversarial Networks"
tensor2tensor usage
Elastic search index for the Armed Conflict Location and Event Data Project (ACLED) from Asia and Africa in the same Elastic Search index.
The Global Terrorism Database (GTD) is an open-source database including information on terrorist events around the world from 1970 through 2016 (with annual updates planned for the future).
Plotting Assignment 1 for Exploratory Data Analysis
Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations
Implementation of Graph Convolutional Networks in TensorFlow
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.