almamon rasool abdali's Projects
PyTorch implementation of Advantage Actor Critic (A2C), Proximal Policy Optimization (PPO) and Scalable trust-region method for deep reinforcement learning using Kronecker-factored approximation (ACKTR).
Image-to-image translation in PyTorch (e.g. horse2zebra, edges2cats, and more)
Supporting Rapid Prototyping with a Toolkit (incl. Datasets and Neural Network Layers)
Part-of-Speech Tagger and custom implementations of LSTM, GRU and Vanilla RNN
Sequence Tagger implementation
Siamese Network implementation using Pytorch
PyTorch Tutorial for Deep Learning Researchers
worshop presnted by me in aswar acady using pytorch in AI
A Python implementation of the YASHE Homomorphic Encryption Scheme
An interactive grid for sorting, filtering, and editing DataFrames in Jupyter notebooks
Healthcheck for the OpenMined platform
A list of papers on Generative Adversarial (Neural) Networks
Graduation project repository, Real-time vehicle detection using two different approaches. HOG+SVM traditional approach and Deep Learning based approach using state of the art YOLO convolutional neural network.
Introduction to Recommender Systems - course for Sber engineers and analysts
Implementation of Reinforcement Learning Algorithms. Python, OpenAI Gym, Tensorflow. Exercises and Solutions to accompany Sutton's Book and David Silver's course.
dataset and code for 2016 paper "Learning a Driving Simulator"
Modular Residual Networks implemented in TensorFlow. Easily change hyperparameters in a few lines.
My personal repository of notes served through Github pages at http://www.ritchieng.com/
An independent, student-led replication of DeepMind's 2016 Nature publication, "Mastering the game of Go with deep neural networks and tree search" (Nature 529, 484-489, 28 Jan 2016), details of which can be found on their website https://deepmind.com/publications.html.
A large scale video database for violence detection, which has 2,000 video clips containing violent or non-violent behaviours.
Scorex 2.0 Core
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
Exploits written by the Rhino Security Labs team
Semantic Segmentation using Fully Convolutional Neural Network.
Chatbot in 200 lines of code