The_Future_of_Cyber_Intelligence_How_Actionable_Deep_Learning_is_Changing_the_Face_of_Security AI 数据分析 移动安全 渗透测试 渗透测试
TinyML实现可识别自来水龙头的声音,一旦听到声音,便会触发蜂鸣器+ LED计时器。
2021-09-08 15:47:27 1.73MB artificial intelligence machine learning
1
Open Source Intelligence Methods and Tools focuses on building a deep understanding of how to exploit open source intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support intelligence analysis. The harvested data can be used in different scenarios such as financial, crime,and terrorism investigations as well as in more regular tasks such as analyzing business competitors, running background checks, and acquiring intelligence about individuals and other entities. This book will also improve your skills in acquiring information online from the surface web, the deep web, and the darknet. Many estimates show that 90 percent of useful information acquired by intelligence services comes from public sources (in other words, OSINT sources). Social media sites open up numerous opportunities for investigations because of the vast amount of useful information located in one place. For example, you can get a great deal of personal information about any person worldwide by just checking their Facebook page. This book will show you how to conduct advanced social media investigations to access content believed to be private, use advanced search engines queries to return accurate results, search historical deleted versions of websites, track individuals online using public record databases and people-searching tools, locate information buried in the deep web, access and navigate the dark web, collect intelligence from the dark web, view multiple historic satellite images and street views of any location, search geolocation information within popular social media sites, and more. In short, you will learn how to use a plethora of techniques, tools, and free online services to gather intelligence about any target online. OSINT-gathering activities should be conducted secretly to avoid revealing the searcher’s identity. Therefore, this book will teach you how to conceal your digital identity and become anonymous online
2021-09-06 16:56:56 8MB Intelligence Open Source
1
【导读】国际人工智能会议AAAI 2021论文将在全程线上举办,时间在 2 月 2 日-2 月 9 日,本届大会也将是第 35 届 AAAI 大会。大会涵盖了众多最近研究进展报告,来自MIla唐建博士、FeiWang博士、Feixiong Cheng共同做了关于人工智能药物发现的进展报告,非常值得关注! 药物发现是一个漫长而昂贵的过程,平均需要10年时间和25亿美元来开发一种新药。人工智能有潜力通过分析生物医学领域产生的大量数据,如生物测定、化学实验和生物医学文献,来显著加速药物发现的进程。最近,在许多不同的领域,包括机器学习、数据挖掘和生物医学领域,人们对开发人工智能技术用于药物发现越来越感兴趣。在本教程中,我们将详细介绍药物发现中的关键问题,如分子性质预测、新生分子设计和分子优化、反合成反应和预测、药物再利用和组合,以及针对这些问题的人工智能关键技术进展。本教程可以作为对药物发现感兴趣的计算机科学家和药物发现从业者的入门材料,以便沿着这个方向学习最新的人工智能技术。
2021-08-30 21:05:15 50.95MB 人工智能
1
Casuality, Correlation and Artificial Intelligence for Rational Decision Making By 作者: Tshilidzi Marwala ISBN-10 书号: 9814630861 ISBN-13 书号: 9789814630863 Release Finelybook 出版日期: March 5, 2015 pages 页数: (208)
2021-08-29 09:27:50 2.69MB AI
1
RNN-换能器语音识别 在Tensorflow 2.0中使用RNN-Transducer进行端到端语音识别 概述 该语音识别模型基于Google的研究论文,并使用Tensorflow 2.0在Python 3中实现。 设置您的环境 要设置您的环境,请运行以下命令: git clone --recurse https://github.com/noahchalifour/rnnt-speech-recognition.git cd rnnt-speech-recognition pip install tensorflow==2.2.0 # or tensorflow-gpu==2.2.0 for GPU support pip install -r requirements.txt ./scripts/build_rnnt.sh # to setup the rnnt loss 共同的
1
leetcode做题笔记
2021-08-21 19:00:58 3.82MB neurol network intelligence
1
tv-t02-ai-deception-fooling-artificial-intelligence-is-easier-than-you-think_copy1
2021-08-21 19:00:27 1.6MB 安全
焦炉火中的DALL-E 在实现/复制 (OpenAI的文本到图像转换器)。 它还将包含用于对世代进行排名。 , 和正在开发 ! 如果您想了解DALL-E在TPU上的培训,请帮助他们。 在复制此内容之前,我们可以适应“或“ 状态 设法在仅2000张风景图像的数据集上训练了一个小的6层DALL-E! (2048个视觉标记) 安装 $ pip install dalle-pytorch 用法 火车VAE import torch from dalle_pytorch import DiscreteVAE vae = DiscreteVAE ( image_size = 256 ,
1
关于商业智能和分析平台的魔力象限报告,从发展趋势,平台类型和功能等层面给各大vendor定性地打上了相应的标签。
2021-08-14 16:21:40 1.03MB 商务智能 魔力象限 BI Analytics
1