401. | Reinforcement Learning for Batch-to-Batch Bioprocess Optimisation | AISC | 31:18 | |
|
402. | Testing Strategies for LLMs - SHERPA - Open Source Project Update, 2023-12-08 | 30:24 | Vlog |
|
403. | Challenges and Solutions for LLMs in Production | 29:58 | |
|
404. | Machine Learning for Cyber Security - Session 5 | 29:35 | |
|
405. | Machine Learning for Cyber Security - Session 19 | 29:30 | |
|
406. | Explaining image classifiers by removing input features using generative models | AISC | 29:03 | |
|
407. | Machine Learning for Cyber Security- Introduction - Session 1 | 28:53 | |
|
408. | Constructing Synthetic Datasets using LLMs | 28:40 | |
|
409. | SMOTE, Synthetic Minority Over-sampling Technique (discussions) | AISC Foundational | 28:28 | Discussion |
|
410. | [original backprop paper] Learning representations by back-propagating errors (part1) | AISC | 28:25 | |
|
411. | Machine Learning on Source Code - GitHub / Open AI Copilot | 28:25 | |
|
412. | LLM Products vs Traditional Digital Products | 28:11 | |
|
413. | LLMs, Gen AI and Stakeholder Buy-in | 28:06 | |
|
414. | Machine Learning for Cyber Security - Session 17 | 27:55 | |
|
415. | LLM Live Book - Project Update - 2023-08-11 | 27:47 | Vlog |
|
416. | Modern Innovations in Fine-Tuning Large Language Models | 27:45 | |
|
417. | [DQN] Human-level control through deep reinforcement learning (discussions) | AISC Foundational | 27:31 | Discussion |
|
418. | Machine Learning for Cyber Security - Session 18 | 27:23 | |
|
419. | PandasAI - Talk to Your Data | 27:11 | |
|
420. | [Word2Bits] Quantized Word Vectors | AISC | 27:05 | |
|
421. | PandasAI - From Open Source to User-centric Products | 27:00 | |
|
422. | Intersection Between LLMs and Products | 26:58 | |
|
423. | Private Investing in Deep Tech - DRT - S2 bonus ep - Ft. Moien Giashi, Darryl Kirsch, Hessie Jones | 26:47 | |
|
424. | Building ResearchLLM: automated statistical research and interpretation | 26:41 | |
|
425. | Optimizing Large Language Models with Reinforcement Learning-Based Prompts | 26:31 | |
|
426. | Eliciting Business Insights at Scale with Conversational AI | 25:45 | |
|
427. | Evaluating Job Exposure to Large Language Models | 25:43 | |
|
428. | Diving Into Document Question and Answering Systems with LLMs | 25:43 | |
|
429. | ThinkGPT: Agent and Chain of Thought techniques for LLMs | 25:31 | |
|
430. | Machine Learning for Cyber Security - Session 9 | 25:21 | |
|
431. | AI for Fun! | 25:13 | |
|
432. | Parallel Collaborative Filtering for the Netflix Prize (algorithm review) | AISC Foundational | 25:01 | Review |
|
433. | Neural Ordinary Differential Equations - part 1 (algorithm review) | AISC | 24:35 | Review |
|
434. | Building Ernie for Topic Modelling Using LLMs | 24:27 | |
|
435. | Semi Supervised Learning - Session 2 | 24:14 | |
|
436. | SHERPA - Open Source Project Update, 2023-09-29 | 24:04 | Vlog |
|
437. | Semi Supervised Learning - Session 13 | 23:53 | |
|
438. | Empirical Rigor in ML | 23:52 | |
|
439. | Agents Embedded in the Real World | 23:40 | |
|
440. | LLM Pitch Session - Technical Customer Experience and Effective Communication | 23:27 | |
|
441. | Visualizing Data using t-SNE (discussions) | AISC Foundational | 23:15 | Discussion |
|
442. | Startup Pitch: Automating Data Extraction with AI | 23:08 | |
|
443. | Machine Learning for Cyber Security- Session 2 | 23:07 | |
|
444. | Reinforcement Learning: AI Gym Environment - Session 15 | 23:04 | |
|
445. | Modern NLP: Review of A Variety of Course Content- Session 4, part 1 | 23:02 | Let's Play |
|
446. | Forecasting Systems and Disruption with Transformers | 22:55 | |
|
447. | PGGAN | Progressive Growing of GANs for Improved Quality, Stability, and Variation (part 2) | AISC | 22:47 | |
|
448. | Semi Supervised Learning - Session 4 | 22:22 | |
|
449. | Project Update - Building a Live Book | 22:09 | |
|
450. | Machine Learning for Cyber Security - Session 16 | 22:06 | |
|
451. | Machine Learning for Cyber Security - Session 7 | 22:04 | |
|
452. | The Emergence of KnowledgeOps | 21:56 | |
|
453. | Detecting Customer Complaint Escalation w/ Recurrent Neural Networks & Manually-Engineered Features | 21:41 | |
|
454. | Semi Supervised Learning - Session 6 | 21:40 | |
|
455. | MultiTask Learning with NLP | 21:35 | Let's Play |
|
456. | Similarity of neural network representations revisited | 21:30 | |
|
457. | Automated Vulnerability Detection in Source Code Using Deep Learning (discussions) | AISC | 21:29 | Discussion |
|
458. | Modern NLP- Additional Processing Topics- Session 4, part 5 | 21:14 | Let's Play |
|
459. | Semi Supervised Learning - Session 12 | 21:02 | |
|
460. | Graph Normalizing Flows | 20:34 | |
|
461. | Machine Learning for Cyber Security - Session 10 | 20:32 | |
|
462. | MLOps: MLflow Hands On, Session 2, part 2 | 20:23 | |
|
463. | Semi Supervised Learning - Session 5 | 20:11 | |
|
464. | Machine Learning for Cyber Security - Session 3 | 20:10 | |
|
465. | An Overview: Sustainability Analysis Framework and Influences of AI on the Sustainability Dimensions | 19:56 | |
|
466. | Machine Learning for Cyber Security - Session 4 | 19:40 | |
|
467. | High Performance Computing on Cloud for Generative AI | 19:39 | |
|
468. | Semi Supervised Learning - Session 10 | 19:37 | |
|
469. | Climate Action Directed by AI Methodologies | 19:30 | Vlog |
|
470. | EigenDamage: Structured Pruning in the Kronecker-Factored Eigenbasis | 19:26 | |
|
471. | Semi Supervised Learning: Introduction - Session 1 | 19:25 | |
|
472. | Machine Learning for Cyber Security- Introduction - Session 6 | 19:18 | |
|
473. | Generative AI Tools and Adoption | 19:13 | |
|
474. | Automatic Evaluation of Dialogue Systems using LLMs | 18:56 | Vlog |
|
475. | Building a LLM Testing API | 18:55 | |
|
476. | Semi Supervised Learning - Session 7 | 18:52 | |
|
477. | Reducing Gender Bias in Google Translate | Melvin Johnson | AISC Algorithmic Inclusion | 18:44 | |
|
478. | Semi Supervised Learning - Session 8 | 18:43 | |
|
479. | Semi Supervised Learning - Session 11 | 18:40 | |
|
480. | Neural Image Caption Generation with Visual Attention (discussion) | AISC | 18:38 | Discussion |
|
481. | Intro to Language Model Operations (LLM-Ops) | 18:06 | |
|
482. | BERT & NLP Explained | 18:05 | Let's Play |
|
483. | Machine Learning for Cyber Security - Session 15 | 17:22 | |
|
484. | Modern Anomaly and Novelty Detection: Exercise - Session 25 | 17:04 | |
|
485. | Lookahead Optimizer: k steps forward, 1 step back | 17:02 | |
|
486. | The Importance of Privacy in ChatGPT and LLMs | 16:52 | |
|
487. | Parallel Collaborative Filtering for the Netflix Prize (results & discussion) AISC Foundational | 16:47 | Discussion |
|
488. | Semi Supervised Learning - Session 3 | 16:25 | |
|
489. | Machine Learning for Cyber Security - Session 8 | 16:02 | |
|
490. | Semi Supervised Learning - Session 9 | 16:02 | |
|
491. | Extracting Biologically Relevant Latent Space from Cancer Transcriptomes \w VAEs (algorithm) | AISC | 15:45 | Vlog |
|
492. | [original backprop paper] Learning representations by back-propagating errors (part2) | AISC | 15:38 | |
|
493. | [Gated-SCNN] Gated Shape CNNs for Semantic Segmentation | 15:35 | |
|
494. | Building your Product Strategy - A Guide | AISC | 15:32 | Guide |
|
495. | Machine Learning for Cyber Security: Graphs and ML- Session 14 | 15:29 | |
|
496. | RPA for Enterprises | 15:10 | |
|
497. | Normie Tools for Validating LLM Outputs | 14:20 | |
|
498. | AI Product, Part 5: Discovery | 14:11 | |
|
499. | MLOps: Flask Iris Model Serving, Session 2, part 1 | 13:53 | |
|
500. | Competitive Advantage for Startups in era of LLMs | 13:37 | |
|