BLOG
Explore all the interesting topics, the latest exciting research in deep learning, and so on.
.
[{"id":305,"link":"https:\/\/ml-dl.com\/understanding-recurrent-neural-networks-rnns\/","name":"understanding-recurrent-neural-networks-rnns","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/06\/image-1.png","alt":""},"title":"Understanding Recurrent Neural Networks (RNNs)","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 26, 2025","dateGMT":"2025-10-26 18:08:01","modifiedDate":"2025-10-26 18:08:01","modifiedDateGMT":"2025-10-26 18:08:01","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":45},"status":"publish","excerpt":""},{"id":260,"link":"https:\/\/ml-dl.com\/but-what-are-word-embeddings\/","name":"but-what-are-word-embeddings","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/05\/image-1.png","alt":""},"title":"But What Are Word Embeddings?","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 23:23:12","modifiedDate":"2025-10-03 23:23:12","modifiedDateGMT":"2025-10-03 23:23:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":17},"status":"publish","excerpt":""},{"id":237,"link":"https:\/\/ml-dl.com\/generative-adversarial-networks-gans-from-scratch\/","name":"generative-adversarial-networks-gans-from-scratch","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/04\/image.png","alt":""},"title":"Generative Adversarial Networks (GANs) From Scratch","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 22:23:12","modifiedDate":"2025-10-03 22:23:12","modifiedDateGMT":"2025-10-03 22:23:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":40},"status":"publish","excerpt":""},{"id":189,"link":"https:\/\/ml-dl.com\/what-is-federated-learning\/","name":"what-is-federated-learning","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/federated-learning.png","alt":""},"title":"What is Federated Learning","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 21:29:30","modifiedDate":"2025-10-03 21:29:30","modifiedDateGMT":"2025-10-03 21:29:30","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":26},"status":"publish","excerpt":""},{"id":210,"link":"https:\/\/ml-dl.com\/universal-backdoor-attacks\/","name":"universal-backdoor-attacks","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-1.png","alt":""},"title":"Universal Backdoor Attacks","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 21:08:12","modifiedDate":"2025-10-03 21:08:12","modifiedDateGMT":"2025-10-03 21:08:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":4,"sec":25},"status":"publish","excerpt":""},{"id":196,"link":"https:\/\/ml-dl.com\/remember-what-you-want-to-forget\/","name":"remember-what-you-want-to-forget","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/remember-what-you-want-to-forget.png","alt":""},"title":"Remember What You Want To Forget","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 20:04:30","modifiedDate":"2025-10-03 20:04:30","modifiedDateGMT":"2025-10-03 20:04:30","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":4},"status":"publish","excerpt":""},{"id":191,"link":"https:\/\/ml-dl.com\/what-is-differential-privacy\/","name":"what-is-differential-privacy","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/10\/differential-privacy.png","alt":""},"title":"What is Differential Privacy?","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 19:44:02","modifiedDate":"2025-10-03 19:44:02","modifiedDateGMT":"2025-10-03 19:44:02","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":13},"status":"publish","excerpt":""},{"id":135,"link":"https:\/\/ml-dl.com\/bim-advanced-fsgm-attack\/","name":"bim-advanced-fsgm-attack","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/02\/test_img_602.png","alt":""},"title":"BIM: Advanced FSGM Attack","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 17:53:12","modifiedDate":"2025-10-03 17:53:12","modifiedDateGMT":"2025-10-03 17:53:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":8},"status":"publish","excerpt":""},{"id":108,"link":"https:\/\/ml-dl.com\/adversarial-attacks\/","name":"adversarial-attacks","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-4.png","alt":""},"title":"Adversarial Attacks","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 16:48:12","modifiedDate":"2025-10-03 16:48:12","modifiedDateGMT":"2025-10-03 16:48:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":51},"status":"publish","excerpt":""},{"id":66,"link":"https:\/\/ml-dl.com\/gradient-descent\/","name":"gradient-descent","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-7.png","alt":""},"title":"Gradient Descent","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 15:38:13","modifiedDate":"2025-10-03 15:38:13","modifiedDateGMT":"2025-10-03 15:38:13","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":54},"status":"publish","excerpt":""},{"id":58,"link":"https:\/\/ml-dl.com\/implementing-linear-regression-in-python-the-naive-way\/","name":"implementing-linear-regression-in-python-the-naive-way","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-6.png","alt":""},"title":"Linear Regression in Python: The Naive Way","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 14:52:28","modifiedDate":"2025-10-03 14:52:28","modifiedDateGMT":"2025-10-03 14:52:28","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":2},"status":"publish","excerpt":""},{"id":34,"link":"https:\/\/ml-dl.com\/linear-regression\/","name":"linear-regression","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/03\/Untitled-design.jpg","alt":""},"title":"Linear Regression","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Oct 3, 2025","dateGMT":"2025-10-03 13:31:53","modifiedDate":"2025-10-03 13:31:53","modifiedDateGMT":"2025-10-03 13:31:53","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":58},"status":"publish","excerpt":""}]