🎯
Focusing
ESA SOCIS'19| Research Intern at IIITH| Deep Learning Practitioner| Full Stack Developer | IIIT-A Undergraduate
- India
Popular repositories Loading
-
-
-
Secure-Communications-using-Adversarial-Neural-Networks-
Secure-Communications-using-Adversarial-Neural-Networks- PublicThe neural networks can learn how to perform forms of encryption and decryption without any use of cryptographic algorithms
-
face-rec-a-1
face-rec-a-1 PublicForked from mrsaicharan1/face-rec-a
An attendance management system using face recognition
Jupyter Notebook 1
-
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.