Skip to content
View fesarikaya's full-sized avatar

Block or report fesarikaya

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. AdversarialAttacks AdversarialAttacks Public

    Adversarial Attacks on Question Answering Systems: Evaluating the Robustness of BERT Models

    Jupyter Notebook 14

  2. Applied-NLP Applied-NLP Public

    Applied Natural Language Processing

    Jupyter Notebook 13 1

  3. CEIA CEIA Public

    This novel adversarial attack method that I have developed is called CEIA (Contextual Embedding Inversion Attack). This method is a sophisticated and novel approach to creating adversarial examples…

    Jupyter Notebook 17 1

  4. GP-Fuzzy GP-Fuzzy Public

    Evolving Interpretable Fuzzy Rule Based Systems with Genetic Programming for Predictive Maintenance

    Jupyter Notebook 12 2

  5. Investment-Value-Prediction Investment-Value-Prediction Public

    Investment Value Prediction with Deep Learning Using Tensorflow.

    Jupyter Notebook 14

  6. SimilarityAlgorithms SimilarityAlgorithms Public

    Comparing Similarity Algorithms

    Jupyter Notebook 10