BLOG
Explore all the interesting topics, the latest exciting research in deep learning, and so on.
.
[{"id":260,"link":"https:\/\/ml-dl.com\/but-what-are-word-embeddings\/","name":"but-what-are-word-embeddings","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/05\/image-1.png","alt":""},"title":"But What Are Word Embeddings?","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 2, 2026","dateGMT":"2026-01-02 01:57:37","modifiedDate":"2026-01-02 01:57:37","modifiedDateGMT":"2026-01-02 01:57:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":17},"status":"publish","excerpt":""},{"id":237,"link":"https:\/\/ml-dl.com\/generative-adversarial-networks-gans-from-scratch\/","name":"generative-adversarial-networks-gans-from-scratch","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/04\/image.png","alt":""},"title":"Generative Adversarial Networks (GANs) From Scratch","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 2, 2026","dateGMT":"2026-01-02 00:43:12","modifiedDate":"2026-01-02 00:43:12","modifiedDateGMT":"2026-01-02 00:43:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":40},"status":"publish","excerpt":""},{"id":189,"link":"https:\/\/ml-dl.com\/what-is-federated-learning\/","name":"what-is-federated-learning","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/federated-learning.png","alt":""},"title":"What is Federated Learning","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 2, 2026","dateGMT":"2026-01-02 00:08:12","modifiedDate":"2026-01-02 00:08:12","modifiedDateGMT":"2026-01-02 00:08:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":26},"status":"publish","excerpt":""},{"id":210,"link":"https:\/\/ml-dl.com\/universal-backdoor-attacks\/","name":"universal-backdoor-attacks","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-1.png","alt":""},"title":"Universal Backdoor Attacks","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 1, 2026","dateGMT":"2026-01-01 23:28:12","modifiedDate":"2026-01-01 23:28:12","modifiedDateGMT":"2026-01-01 23:28:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":4,"sec":25},"status":"publish","excerpt":""},{"id":196,"link":"https:\/\/ml-dl.com\/remember-what-you-want-to-forget\/","name":"remember-what-you-want-to-forget","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/remember-what-you-want-to-forget.png","alt":""},"title":"Remember What You Want To Forget","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 1, 2026","dateGMT":"2026-01-01 23:02:27","modifiedDate":"2026-01-01 23:02:27","modifiedDateGMT":"2026-01-01 23:02:27","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":4},"status":"publish","excerpt":""},{"id":191,"link":"https:\/\/ml-dl.com\/what-is-differential-privacy\/","name":"what-is-differential-privacy","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/10\/differential-privacy.png","alt":""},"title":"What is Differential Privacy?","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 1, 2026","dateGMT":"2026-01-01 21:33:12","modifiedDate":"2026-01-01 21:33:12","modifiedDateGMT":"2026-01-01 21:33:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":13},"status":"publish","excerpt":""},{"id":135,"link":"https:\/\/ml-dl.com\/bim-advanced-fsgm-attack\/","name":"bim-advanced-fsgm-attack","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/02\/test_img_602.png","alt":""},"title":"BIM: Advanced FSGM Attack","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 1, 2026","dateGMT":"2026-01-01 20:42:31","modifiedDate":"2026-01-01 20:42:31","modifiedDateGMT":"2026-01-01 20:42:31","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":8},"status":"publish","excerpt":""},{"id":66,"link":"https:\/\/ml-dl.com\/gradient-descent\/","name":"gradient-descent","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-7.png","alt":""},"title":"Gradient Descent","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 1, 2026","dateGMT":"2026-01-01 20:11:21","modifiedDate":"2026-01-01 20:11:21","modifiedDateGMT":"2026-01-01 20:11:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":54},"status":"publish","excerpt":""},{"id":108,"link":"https:\/\/ml-dl.com\/adversarial-attacks\/","name":"adversarial-attacks","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-4.png","alt":""},"title":"Adversarial Attacks","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 1, 2026","dateGMT":"2026-01-01 19:04:02","modifiedDate":"2026-01-01 19:04:02","modifiedDateGMT":"2026-01-01 19:04:02","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":51},"status":"publish","excerpt":""},{"id":58,"link":"https:\/\/ml-dl.com\/implementing-linear-regression-in-python-the-naive-way\/","name":"implementing-linear-regression-in-python-the-naive-way","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/12\/image-6.png","alt":""},"title":"Linear Regression in Python: The Naive Way","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 1, 2026","dateGMT":"2026-01-01 17:08:12","modifiedDate":"2026-01-01 17:08:12","modifiedDateGMT":"2026-01-01 17:08:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":2},"status":"publish","excerpt":""},{"id":34,"link":"https:\/\/ml-dl.com\/linear-regression\/","name":"linear-regression","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2023\/03\/Untitled-design.jpg","alt":""},"title":"Linear Regression","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Jan 1, 2026","dateGMT":"2026-01-01 15:47:34","modifiedDate":"2026-01-01 15:47:34","modifiedDateGMT":"2026-01-01 15:47:34","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":58},"status":"publish","excerpt":""},{"id":342,"link":"https:\/\/ml-dl.com\/can-you-hide-malware-in-neural-networks\/","name":"can-you-hide-malware-in-neural-networks","thumbnail":{"url":false,"alt":false},"title":"Can You Hide Malware in Neural Networks?","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Dec 27, 2025","dateGMT":"2025-12-27 16:28:12","modifiedDate":"2025-12-27 16:28:12","modifiedDateGMT":"2025-12-27 16:28:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":7},"status":"publish","excerpt":""},{"id":305,"link":"https:\/\/ml-dl.com\/understanding-recurrent-neural-networks-rnns\/","name":"understanding-recurrent-neural-networks-rnns","thumbnail":{"url":"https:\/\/ml-dl.com\/wp-content\/uploads\/2024\/06\/image-1.png","alt":""},"title":"Understanding Recurrent Neural Networks (RNNs)","author":{"name":"Rishabh","link":"https:\/\/ml-dl.com\/author\/mldl\/"},"date":"Dec 25, 2025","dateGMT":"2025-12-25 20:32:58","modifiedDate":"2025-12-25 20:32:58","modifiedDateGMT":"2025-12-25 20:32:58","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>","space":"<a href=\"https:\/\/ml-dl.com\/category\/basics\/\" rel=\"category tag\">Basics<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":45},"status":"publish","excerpt":""}]