BLOG
Explore all the interesting topics, the latest exciting research in deep learning, and so on.
.
[{"id":355,"link":"https:\/\/ml-dl.com\/machinehuman-learning-in-daily-life\/","name":"machinehuman-learning-in-daily-life","thumbnail":{"url":false,"alt":false},"title":"Machine(Human) Learning in Daily Life","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 15, 2026","dateGMT":"2026-03-15 23:51:11","modifiedDate":"2026-03-15 23:51:54","modifiedDateGMT":"2026-03-15 23:51:54","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":33},"status":"publish","excerpt":""},{"id":260,"link":"https:\/\/ml-dl.com\/but-what-are-word-embeddings\/","name":"but-what-are-word-embeddings","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/05\/image-1.png","alt":""},"title":"But What Are Word Embeddings?","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 3, 2026","dateGMT":"2026-03-03 03:38:18","modifiedDate":"2026-03-03 03:38:18","modifiedDateGMT":"2026-03-03 03:38:18","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":17},"status":"publish","excerpt":""},{"id":189,"link":"https:\/\/ml-dl.com\/what-is-federated-learning\/","name":"what-is-federated-learning","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/federated-learning.png","alt":""},"title":"What is Federated Learning","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 3, 2026","dateGMT":"2026-03-03 02:23:16","modifiedDate":"2026-03-03 02:23:16","modifiedDateGMT":"2026-03-03 02:23:16","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":26},"status":"publish","excerpt":""},{"id":237,"link":"https:\/\/ml-dl.com\/generative-adversarial-networks-gans-from-scratch\/","name":"generative-adversarial-networks-gans-from-scratch","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/04\/image.png","alt":""},"title":"Generative Adversarial Networks (GANs) From Scratch","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 3, 2026","dateGMT":"2026-03-03 01:48:12","modifiedDate":"2026-03-03 01:48:12","modifiedDateGMT":"2026-03-03 01:48:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":40},"status":"publish","excerpt":""},{"id":210,"link":"https:\/\/ml-dl.com\/universal-backdoor-attacks\/","name":"universal-backdoor-attacks","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-1.png","alt":""},"title":"Universal Backdoor Attacks","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 3, 2026","dateGMT":"2026-03-03 00:58:14","modifiedDate":"2026-03-03 00:58:14","modifiedDateGMT":"2026-03-03 00:58:14","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":4,"sec":25},"status":"publish","excerpt":""},{"id":196,"link":"https:\/\/ml-dl.com\/remember-what-you-want-to-forget\/","name":"remember-what-you-want-to-forget","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/remember-what-you-want-to-forget.png","alt":""},"title":"Remember What You Want To Forget","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 3, 2026","dateGMT":"2026-03-03 00:29:02","modifiedDate":"2026-03-03 00:29:02","modifiedDateGMT":"2026-03-03 00:29:02","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":4},"status":"publish","excerpt":""},{"id":191,"link":"https:\/\/ml-dl.com\/what-is-differential-privacy\/","name":"what-is-differential-privacy","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/10\/differential-privacy.png","alt":""},"title":"What is Differential Privacy?","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 2, 2026","dateGMT":"2026-03-02 23:18:15","modifiedDate":"2026-03-02 23:18:15","modifiedDateGMT":"2026-03-02 23:18:15","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":13},"status":"publish","excerpt":""},{"id":135,"link":"https:\/\/ml-dl.com\/bim-advanced-fsgm-attack\/","name":"bim-advanced-fsgm-attack","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/02\/test_img_602.png","alt":""},"title":"BIM: Advanced FSGM Attack","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 2, 2026","dateGMT":"2026-03-02 23:12:33","modifiedDate":"2026-03-02 23:12:33","modifiedDateGMT":"2026-03-02 23:12:33","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":8},"status":"publish","excerpt":""},{"id":66,"link":"https:\/\/ml-dl.com\/gradient-descent\/","name":"gradient-descent","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-7.png","alt":""},"title":"Gradient Descent","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 2, 2026","dateGMT":"2026-03-02 22:08:12","modifiedDate":"2026-03-02 22:08:12","modifiedDateGMT":"2026-03-02 22:08:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":54},"status":"publish","excerpt":""},{"id":108,"link":"https:\/\/ml-dl.com\/adversarial-attacks\/","name":"adversarial-attacks","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-4.png","alt":""},"title":"Adversarial Attacks","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 2, 2026","dateGMT":"2026-03-02 20:18:12","modifiedDate":"2026-03-02 20:18:12","modifiedDateGMT":"2026-03-02 20:18:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":51},"status":"publish","excerpt":""},{"id":58,"link":"https:\/\/ml-dl.com\/implementing-linear-regression-in-python-the-naive-way\/","name":"implementing-linear-regression-in-python-the-naive-way","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-6.png","alt":""},"title":"Linear Regression in Python: The Naive Way","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 2, 2026","dateGMT":"2026-03-02 19:09:04","modifiedDate":"2026-03-02 19:09:04","modifiedDateGMT":"2026-03-02 19:09:04","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":2},"status":"publish","excerpt":""},{"id":34,"link":"https:\/\/ml-dl.com\/linear-regression\/","name":"linear-regression","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/03\/Untitled-design.jpg","alt":""},"title":"Linear Regression","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Mar 2, 2026","dateGMT":"2026-03-02 17:43:16","modifiedDate":"2026-03-02 17:43:16","modifiedDateGMT":"2026-03-02 17:43:16","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":58},"status":"publish","excerpt":""},{"id":342,"link":"https:\/\/ml-dl.com\/can-you-hide-malware-in-neural-networks\/","name":"can-you-hide-malware-in-neural-networks","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2025\/10\/image-2.png","alt":""},"title":"Can You Hide Malware in Neural Networks?","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Feb 25, 2026","dateGMT":"2026-02-25 19:03:13","modifiedDate":"2026-02-25 19:03:13","modifiedDateGMT":"2026-02-25 19:03:13","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":7},"status":"publish","excerpt":""},{"id":305,"link":"https:\/\/ml-dl.com\/understanding-recurrent-neural-networks-rnns\/","name":"understanding-recurrent-neural-networks-rnns","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/06\/image-1.png","alt":""},"title":"Understanding Recurrent Neural Networks (RNNs)","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Feb 23, 2026","dateGMT":"2026-02-23 23:03:13","modifiedDate":"2026-02-23 23:03:13","modifiedDateGMT":"2026-02-23 23:03:13","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":45},"status":"publish","excerpt":""}]