robsss
2020 too: A novice programmer for now. Strving to master one programming language and learn more about computer science.
Pinned Repositories
18S096SciML
18.S096 - Applications of Scientific Machine Learning
chebfun
Chebfun: numerical computing with functions.
CopyTranslator
Foreign language reading and translation assistant based on copy and translate.
deep-learning-with-python-notebooks
Jupyter notebooks for the code samples of the book "Deep Learning with Python"
Iot-Cyber-Security-with-Machine-Learning
IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they contain. In response, network intrusion detection systems have been developed to detect suspicious network activity. UNSW-NB15 is an IoT-based network traffic data set with different categories for normal activities and malicious attack behaviors. UNSW-NB15 botnet datasets with IoT sensors' data are used to obtain results that show that the proposed features have the potential characteristics of identifying and classifying normal and malicious activity. Role of ML algorithms is for developing a network forensic system based on network flow identifiers and features that can track suspicious activities of botnets is possible. The ML model metrics using the UNSW-NB15 dataset revealed that ML techniques with flow identifiers can effectively and efficiently detect botnets’ attacks and their tracks.
Optimal-Control-Based-Fixed-Wing-Aircraft-Landing-Controller-Design
optimal-control-direct-method-examples
Teaching examples for three direct methods for solving optimal control problems namely single shooting, single step, and pseudospectral.
Reinforcement-Learning-2nd-Edition-by-Sutton-Exercise-Solutions
Solutions for Reinforcement Learning, An Introduction
reinforcement-learning-an-introduction
Python Implementation of Reinforcement Learning: An Introduction
sklearn-doc-zh
:book: [译] scikit-learn(sklearn) 中文文档
robsss's Repositories
robsss/Iot-Cyber-Security-with-Machine-Learning
IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they contain. In response, network intrusion detection systems have been developed to detect suspicious network activity. UNSW-NB15 is an IoT-based network traffic data set with different categories for normal activities and malicious attack behaviors. UNSW-NB15 botnet datasets with IoT sensors' data are used to obtain results that show that the proposed features have the potential characteristics of identifying and classifying normal and malicious activity. Role of ML algorithms is for developing a network forensic system based on network flow identifiers and features that can track suspicious activities of botnets is possible. The ML model metrics using the UNSW-NB15 dataset revealed that ML techniques with flow identifiers can effectively and efficiently detect botnets’ attacks and their tracks.
robsss/bootstrap
The most popular HTML, CSS, and JavaScript framework for developing responsive, mobile first projects on the web.
robsss/comments-for-awesome-courses
名校公开课程评价网
robsss/CS-Masters-Application.github.io
计算机硕士出国申请 | CS Masters Application
robsss/cs231n
CS231N_2020_assignment
robsss/cs50ai
Harvard cs50ai learning materials
robsss/cs50p
This is an another repository of cs50, which specifically work with python.
robsss/cs50w
Harvard cs50 web programming with python.
robsss/cs50x
This is my private repo for cs50 learning process,
robsss/detectron2
Detectron2 is a platform for object detection, segmentation and other visual recognition tasks.
robsss/DGCode
robsss/efficient_inference_on_cnn
efficient algorithm for neural net inference
robsss/FUCK-GFW
记录各个包管理器使用代理的方法, 因为GFW已经浪费了已经数不清的时间, FUCK GFW
robsss/gfwlist
The one and only one gfwlist here
robsss/hello
Just learning to use GitHub
robsss/introtodeeplearning
Lab Materials for MIT 6.S191: Introduction to Deep Learning
robsss/leetcode
My own leetcode solution summary, hope it will be helpful for anyone interested.
robsss/makefiletutorial
Learn make by example
robsss/missing-semester
The Missing Semester of Your CS Education 📚
robsss/planet_sim
planet_simulation using python
robsss/proxychains
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
robsss/python_automation_project
This repository follow one Youtube Video and related GitHub repo.
robsss/pytorch-examples
Simple examples to introduce PyTorch
robsss/robsss.github.io
robsss/TJUThesis_master_2021
天大博士/硕士学位论文Latex模板,根据2021年版要求修改,可直接在Overleaf上运行。:star:所写的论文成功提交天津大学图书馆存档!(2021.12.24)
robsss/ubuntu_config
If it possible to automatically configure my ubuntu terminal environment after reinstall my system once I screwed up my system?
robsss/ucasthesis
LaTeX Thesis Template for the University of Chinese Academy of Sciences
robsss/uvadlc_notebooks
Repository of Jupyter notebook tutorials for teaching the Deep Learning Course at the University of Amsterdam (MSc AI), Fall 2021
robsss/wsl
wsl configuration
robsss/YOLO-TI-TMS320C68335-OpenCL
YOLO-TI-TMS320C68335-OpenCL