新手上路
2025-12-20 13:47
主楼
香港城市大学系统的CS资料课程文件
- (done)20240907-贝叶斯算法-统计学关我什么事儿
- website_address.txt
- 内曼-皮尔逊统计学.png
- 医疗诊断也是贝叶斯推理过程.png
- 序贯理性.png
- 患病阳性概率95趴而阳性患病概率不见得96趴.png
- 统计学关我什么事-本命巧克力与义理巧克力.png
- 统计学关我什么事.pptx
- 统计学关我什么事:生活中的极简统计学(日本人气畅销10万册,统计思维基础读物! 画画“面积图”就能学,会加减乘除就能学。 用统计学的思维看... (Z-Library)(1).pdf
- 这个义理巧克力太逗了.png
- .gitignore
- .vscode
- 20240916-算法图解
- Grokking Algorithms - An illustrated guide for programmers and other curious people.pdf
- code2.py
- code4_1_sum.py
- code4_2_count_list.py
- 算法图解 ((美)巴尔加瓦(Aditya Bhargava)著, 袁国忠译) (Z-Library).pdf
- 算法图解.pptx
- CS5182_Computer_Graphics
- Course schedule.pdf
- Course_Project
- Lecture Note
- Aliasing and Anti-aliasing_CS5182.pdf
- Deep learning for 3D point clouds_CS5182.pdf
- GPU and Computer Animation_CS5182.pdf
- Hidden Surface Removal and Shading_CS5182.pdf
- Introduction to Computer Graphics_CS5182.pdf
- Object modeling_CS5182.pdf
- Projection and Clipping_CS5182.pdf
- Ray tracing and radiosity_CS5182.pdf
- Real time rendering2_CS5182.pdf
- Revision_5182_2024.pdf
- The Rendering Pipeline_CS5182.pdf
- Transformation_CS5182.pdf
- Mid Term Quiz
- Tutorial Note
- CS5182_Tensorflow_object detection_Tutorial.pdf
- CS5182_humanreconsturction_tutorial.pdf
- CS5182_pytorch_tutorial.pdf
- Generative Models_CS5182_V2.pptx
- geometry_representation_tutorial.pdf
- nerf_3dgauss_tutorial.pdf
- 课堂笔记.pptx
- CS5187_Vision_and_Image
- Assignments
- Assignment1
- Assignment 1
- Assignment1_guideline
- CV_assignment1_guideline_CNN
- CS5187_assignment1_guideline_torch.pptx
- assignment1_torch_code.zip
- deep_learning_reference_paper_code.docx
- CV_assignment1_guideline_with_handcrafted_feature
- .ipynb_checkpoints
- Information_for_asg1.pptx
- rank_list.ipynb
- CS5187_Assignment1.docx
- Readme.docx
- python.mp4
- tutorial_opencv.pptx
- tutorial_python.pptx
- Assignment2
- Group Project
- Week01
- Week02
- Week03
- Week04
- Week05
- Week06
- Week07
- Week08
- Week09
- Week11
- Week12
- CS5222_Computer_Networks_and_Internets
- Assessment
- Assignment Questions
- CS5222 Assignment 1 Solution_2024.pdf
- CS5222 Assignment 2 Solution_2024.pdf
- CS5222 Assignment 2_2024.pdf
- CS5222_Assignment_3_2024.pdf
- CS5222_Assignment_3_Solution_2024.pdf
- dijkstra.jpg
- dns.png
- fig002.jpg
- m1.png
- mac_addr.jpg
- mac_protocols.png
- midterm_pic1.png
- midterm_pic2.png
- midterm_pic3.png
- scheduling.png
- sockets.png
- subnets.png
- switches2.png
- Group Project
- Lecture Slides
- Application_Layer_2024.pdf
- CS5222 Final_exam Review-2024.pdf
- Introduction_2024_lec01.pdf
- Link Layer_2024.pdf
- Network Layer (Control Plane).pdf
- Network Layer (Control Plane)_lec06.pdf
- Network Layer (Data Plane)_05.pdf
- Security_lec12.pdf
- Transport_Layer_2024_lec03_04.pdf
- Wireless Networks_2024_lec11.pdf
- Previous Documents
- Logostics-CS5222-2024.pdf
- 20240911
- CS5222_syllabus.pdf
- Calcu_Packet_Switching.py
- Introduction_2024_lec01.pdf
- Week1.pptx
- assignment1-20240915
- socket-program
- tweet-a-watt.png
- week3
- 单词表-CS5222.xlsx
- Research Report
- Tutorials
- tutorial_1.pdf
- tutorial_1_slides.pdf
- tutorial_1_solutions.pdf
- tutorial_3_solutions.pdf
- Socket_programming_2024.pdf
- tutorial_10-2024.pdf
- tutorial_10_solutions-2024.pdf
- tutorial_10_solutions.pdf
- tutorial_11_2024.pdf
- tutorial_11_solutions.pdf
- tutorial_12-2024.pdf
- tutorial_12_solutions-2024.pdf
- tutorial_2.pdf
- tutorial_2_slides.pdf
- tutorial_2_slidesSolution.pdf
- tutorial_3.pdf
- tutorial_4.pdf
- tutorial_4_slides-solution.pdf
- tutorial_5.pdf
- tutorial_5_solutions.pdf
- tutorial_6.pdf
- tutorial_6_solutions.pdf
- tutorial_7-2024.pdf
- tutorial_7_solutions-2024.pdf
- tutorial_8.pdf
- tutorial_8_solutions.pdf
- CS5285_Infor_Security_for_E-commerce
- 00.Additional Books
- 01. Introductory Concepts of Security (Tutorial 1 + Reading)
- 01.01 Human aspect of security
- 02. Symmetric Encryption (Tutorial 2+3)
- Content.pdf
- Lecture 2- Symmetric-Key-Encryption - Notes.pdf
- Lecture 2- Symmetric-Key-Encryption-SlidesOnly.pptx
- Tutorial 02 Solutions.pdf
- Tutorial 03 Solutions.pdf
- Tutorial 03.pdf
- 02.01 Encryption Optional Exercise 1
- 02.02 Symmetric Encryption (Extra Reading)
- 02.03 AES (for interest)
- 02.04 Zodiac 340 Code (Interest Only)
- 03. Number Theory (Tutorial 4)
- Breaking Down Number Theory Notes.pdf
- Content.pdf
- Lecture 3- Number-Theory - Notes.pdf
- Lecture 3- Number-Theory.pdf
- Tutorial 4 Solutions.pdf
- Tutorial 4.pdf
- 03.01 Number Theory and Practical Security (interest Only)
- 04. Asymmetric Encryption
- 05. Integrity (Tutorial 5)
- Content.pdf
- Lecture 5 - Signature-Hash-MAC.pdf
- Lecture 5 - Signature-Hash-MACNotes.pdf
- Tutorial 5 Solutions.pdf
- Tutorial 5.pdf
- 05.01 Signatures and hash (Reading for Interest)
- Content.pdf
- MD5 flaw pops up in Australian traffic court - CNET.pdf
- NSW speed cameras in doubt - National - theage.com.pdf
- 05.02 SHA-3 (Keccak) (for interest)
- 06. Authentication (Tutorial 6)
- Content.pdf
- Lecture 6- Authentication-Notes.pdf
- Lecture 6- Authentication-Slides.pptx
- Lecture 6- Authentication.pdf
- Tutorial 6 Solutions.pdf
- Tutorial 6.pdf
- 07. Key Management (Tutorial 7+8)
- Content.pdf
- Lecture 7 - Key management - Notes.pdf
- Lecture 7 - Key management.pdf
- Lecture 7 - Key management_slides.pptx
- Tutorial 7 Solutions.pdf
- Tutorial 7.pdf
- Tutorial 8 Solutions.pdf
- Tutorial 8.pdf
- 07.01 Signal Protocol (Extra Reading)
- 08. Computer Security (Tutorial 9)
- Content.pdf
- Lecture 8 - CompSec - Notes.pdf
- Lecture 8 - CompSec.pdf
- Tutorial 9.pdf
- Tutorial 9_solutions.pdf
- 09. Network Security (Tutorial 10+11)
- Content.pdf
- Lecture 9 - Network - Notes.pdf
- Lecture 9 - Network.pdf
- Tut10_solution.pdf
- Tut11_solution.pdf
- Tutorial 10.pdf
- Tutorial 11.pdf
- 10.Selected Topics
- 11.Revision
- CS5285.pdf
- Exam+PracticeQuestions
- Final
- Pages(very_important!).docx
- Previous Document
- 01. Introductory Concepts of Security (Tutorial 1 + Reading)
- 02. Symmetric Encryption (Tutorial 2+3)
- Problem Sets And Midterms
- Midterm Solutions 2024.pdf
- PS1_2024.pdf
- PS1_Solution_updated.pdf
- PS2_2024.pdf
- PS2_solutions_modified.pdf
- file1.txt
- file2.txt
- file3.txt
- tsgexercise_cert.asc
- 单词表.tsv
- 单词表.xlsx
- 课件笔记.pptx
- CS5351_Software_Engineering
- Code
- Files
- Slides
- Week10-Ex-Fuzzing-Solution.pdf
- Week10-Ex-Fuzzing.pdf
- Week6-Ex_hard_choice.pdf
- week1-cs5351-introduction.pptx
- week1-cs5351-project.pptx
- week10-cs5351-testing2-v5.pdf
- week11-cs5351-maintenance.pdf
- week2-cs5351-process-tutorrial-on-scrum.pptx
- week2-cs5351-process.pptx
- week3-cs5351-ModernCodeReview.pptx
- week3-moden code review-tutorial.pdf
- week4-cs5351-RE-exercise.pptx
- week4-cs5351-requirement.pptx
- week5-cs5351-design-principle-and-framework-v8.pdf
- week5-cs5351-sa-exercise-smart choice-concise-4up-printout.pdf
- week5-cs5351-sa-exercise-smart choice.pptx
- week6-cs5351-technical-debt-v4.pptx
- week7-CS5351-2024SemB-Quiz-with-solution.pdf
- week8-Tutorial-code-with-quality-2024-questions.pdf
- week8-cs5351-code-with-quality-v6.pdf
- week9-Program Testing Ex-Github-Project-and-CI.pdf
- week9-cs5351-testing-v13.1.pdf
- CS5481_Data_Engineering
- GroupProject
- Homework
- Lecture
- Lecture_1.pptx
- Lecture_10.pptx
- Lecture_11.pptx
- Lecture_12.pptx
- Lecture_2.pptx
- Lecture_3.pptx
- Lecture_4.pptx
- Lecture_5.pptx
- Lecture_6.pptx
- Lecture_7.pptx
- Lecture_8.pptx
- Lecture_9.pptx
- Tutorial
- tutorial_week1_Installation and Simple Usage of Anaconda.pdf
- tutorial_week1_introduction_5481.ipynb
- tutorial_week2.ipynb
- tutorial_week3.ipynb
- tutorial_week4.ipynb
- tutorial_week5.ipynb
- tutorial_week6.pdf
- tutorial_week6_init_tables.txt
- tutorial_week7.ipynb
- tutorial_week8.ipynb
- tutorial_week9.ipynb
- dataset
- CS5486_Intelligent_Systems
- Assignments
- Lecture
- ReferencePapers
- ASSPM-Lippmann1987.pdf
- CS-Broomhead-Lowe1988.pdf
- LS-SVM-load.pdf
- NPL-LS_SVM.pdf
- SVR-tutorial.pdf
- SVR.pdf
- Science-Kirkpatrick-Gelatt-Vecchi1983.pdf
- TLU.pdf
- TNN-Wang2010.pdf
- SyllabusAndAssessment.pdf
- Tutorials
- CS5489_Machine_Learning
- Assignments
- Home_Assignments_1.pdf
- Home_Assignments_2.pdf
- Home_Assignments_3.pdf
- Home_Assignments_4.pdf
- Home_Assignments_Solutions_1.pdf
- Home_Assignments_Solutions_2.pdf
- Home_Assignments_Solutions_3.pdf
- Home_Assignments_Solutions_4.pdf
- Final
- Lectures
- Lecture1
- Lecture10
- Lecture11
- Lecture12
- Lecture2
- Lecture3
- Lecture4
- Lecture5
- Lecture6
- Lecture7
- Lecture8
- Lecture9
- PreviousDocument
- matrixcookbook.pdf
- Lecture3
- lecture3.3.pdf
- .ipynb_checkpoints
- Lecture3.1.pdf
- Lecture3.2.pdf
- Lecture3.3.ipynb
- Tutorial 1
- .ipynb_checkpoints
- 20news-bydate_py3.pkz
- Tutorial1.ipynb
- lecture1
- K-D Tree - OI Wiki.pdf
- Lecture1.1_rere.pdf
- Lecture1.2_re.pdf
- Lecture1.3(without answer)
- Lecture1.3(without answer)
- lecture 1
- 用jupyter打开D盘的文件.png
- lecture2
- Lecture2.3.pdf
- .ipynb_checkpoints
- Lecture2.1.pdf
- Lecture2.2.pdf
- Lecture2.3.ipynb
- 【Python】笨办法理解高维数组求和 .sum(axis=0_1_2_...)_sum(axis=[0,2])-CSDN博客.pdf
- lecture_notes.pdf
- Tutorials
- Tutorial 1.zip
- Tutorial 2.zip
- Tutorial 3.zip
- Tutorial 4.zip
- Tutorial 5.zip
- Tutorial 6.zip
- Tutorial 7.zip
- Tutorial 8.zip
- Tutorial1-Completed.ipynb
- Tutorial2-Completed.ipynb
- Tutorial3-Completed.ipynb
- Tutorial4-Completed.ipynb
- Tutorial5-Completed.ipynb
- Tutorial6-Completed.ipynb
- Tutorial7-Completed.ipynb
- Tutorial8-Completed.ipynb
- lecture_notes.pdf
- 单词补充.TXT
- 单词表.xlsx
- 英语生词-基于kimi(lecture1-3尚未补充).docx
- 课程笔记.pptx
- CS5491_Artificial_Intelligence
- Assignments
- HW2.zip
- HW2
- Description_Homework_2.pdf
- HW2
- Topic_5_Data
- ISIC84by84
- Train
- BKL
- NV
- VASC
- Topic_3_Data
- Topic_5_Data
- ISIC84by84
- Test
- AK
- BCC
- BKL
- DF
- MEL
- NV
- SCC
- VASC
- Train
- AK
- BKL
- DF
- ~$scription_Homework_2.docx
- HW_1.pdf
- Lecture 01
- Lecture 02
- Lecture 03
- Lecture 04
- Lecture 05
- Lecture 06
- Lecture 07
- Lecture 08
- 22.2_Reinforcement_Learning_Model_Based.pdf
- 22.3_Reinforcement_Learning_Value_Functions.pdf
- 22.5_Reinforcement_Policy_Gradients.pdf
- Week10_Tutorial.ipynb
- Week11_Tutorial_wo_answers.ipynb
- Week12_Tutorial.ipynb
- MIT 6.S978
- CM_lecture.pdf
- data_ownership_MIT_guest_lecture.pdf
- lec1_intro.pdf
- lec2_vae.pdf
- lec3_ar.pdf
- lec4_gan.pdf
- lec5_diffusion.pdf
- Reference Book
- Reference Solutions.pdf
- SelectedChapters
- ai_3rd_edition_AI_Russell_Norvig.pdf
- Stanford CS231N
- lecture_10.pdf
- lecture_11.pdf
- lecture_12.pdf
- lecture_13.pdf
- lecture_14.pdf
- lecture_15.pdf
- lecture_16.pdf
- lecture_17.pdf
- lecture_1_part_1.pdf
- lecture_1_part_2.pdf
- lecture_2.pdf
- lecture_3.pdf
- lecture_4.pdf
- lecture_5.pdf
- lecture_6.pdf
- lecture_7.pdf
- lecture_8.pdf
- lecture_9.pdf
- course_image
- CS6290_Privacy_Enhancing_Technologies
- Assignment
- CS6290_Assignment_1
- CS6290_Assignment_2
- CS6290_Assignment_3
- Group project
- Lecture
- CS6290-Lecture11.pdf
- CS6290-Lecture12-Course Revision.pdf
- CS6290-Lecture13-Final Project Presentation.pdf
- CS6290-Lecture2.pdf
- CS6290-Lecture6.pdf
- CS6290-Lecture7.pdf
- CS6290-Lecture9.pdf
- PreviousDocument
- CS6290-Tutorial4.zip
- CS6290-Tutorial4
- __MACOSX
- CS6290-Tutorial4
- CS6290-Week10.zip
- CS6290-Week10
- CS6290-Week10
- __MACOSX
- CS6290-Week10
- ._CS6290-Lecture10.pdf
- ._readings
- readings
- ._1-Towards_Evaluating_the_Robustness_of_Neural_Networks.pdf
- ._2-The Secret Sharer Evaluating and Testing Unintended Memorization in Neural Networks.pdf
- ._3-Membership_Inference_Attacks_Against_Machine_Learning_Models.pdf
- ._4-Stealing Machine Learning Models via Prediction APIs.pdf
- ._5-SoK_Unintended_Interactions_among_Machine_Learning_Defenses_and_Risks.pdf
- ._6-SoK_Security_and_Privacy_in_Machine_Learning.pdf
- CS6290-Week4.zip
- CS6290-Week5.zip
- CS6290_Assignment_1.ipynb
- PrivacyEnhancing.zip
- Project Materials
- SoK Decentralized Finance (DeFi).pdf
- SoK_Decentralized_Finance_DeFi_Attacks.pdf
- SoK_Yield_Aggregators_in_DeFi.pdf
- Week 1
- Week 2
- Week 3
- Week 4
- CS6290-Week4
- CS6290-week4
- __MACOSX
- Week 5
- CS6290-Week5
- Week5
- CS6290-Lecture5.pdf
- suggested readings
- __MACOSX
- CS6290-Week7-New
- CS6290-Week7
- CS6290-Week7
- __MACOSX
- Week 7
- __MACOSX
- CS6290-Week7-New
- ._CS6290-Lecture7.pdf
- ._readings
- readings
- Readings
- Week10
- 1-Towards_Evaluating_the_Robustness_of_Neural_Networks.pdf
- 2-The Secret Sharer Evaluating and Testing Unintended Memorization in Neural Networks.pdf
- 3-Membership_Inference_Attacks_Against_Machine_Learning_Models.pdf
- 4-Stealing Machine Learning Models via Prediction APIs.pdf
- 5-SoK_Unintended_Interactions_among_Machine_Learning_Defenses_and_Risks.pdf
- 6-SoK_Security_and_Privacy_in_Machine_Learning.pdf
- Week4
- Week7
- 1-Third-Party Web Tracking Policty and Technology.pdf
- 2-The Princeton Web Transparency and Accountability Project.pdf
- 3-No boundaries- data exfiltration by third parties embedded on web pages.pdf
- 4-Diffusion of User Tracking Data in the Online Advertising Ecosystem.pdf
- Week8
- 1-Survey_of_attacks_on_private_data.pdf
- 2-Differential Privacy_ A Primer for a Non-Technical Audience.pdf
- 3-privacybook.pdf
- 4-Robust_De-anonymization_of_Large_Sparse_Datasets.pdf
- 5-Attacks_on_Deindentifications_Defenses.pdf
- 6-De-anonymizing_Social_Networks.pdf
- Week1
- 1-Bitcoin_a_peer-to-peer_electronic_cash_system.pdf
- 2-Blockchain_foundations_chapter1.pdf
- 3-SoK_research_perspectives_and_challenges_for_bitcoin_and_cryptocurrencies.pdf
- 4-The_moral_character_of_cryptographic_work.pdf
- Week11
- 1-DAN-Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models.pdf
- 2-Extracting Training Data from Large Language Models.pdf
- 3-Scalable Extraction of Training Data from Aligned Production Language Models.pdf
- 4-Universal and Transferable Adversarial Attacks on Aligned Language Models.pdf
- 5-Red Teaming Language Models with Language Models.pdf
- Week2
- 1-Byzantine_generals_problem.pdf
- 2-Security_proof_for_Nakamoto_consensus.pdf
- 3-On_scaling_decentralized_blockchains.pdf
- 4-Secure_high-rate_transaction_processing_in_bitcoin.pdf
- Week5
- Tutorial
- CS6382_Algorithm_Analysis_and_Game_Theory
- 疑问.xlsx
- Assignments
- DP
- 【动态规划秘籍】001 彻底搞懂动态规划.pptx
- 【动态规划秘籍】002 线性动态规划详解 .pptx
- 【动态规划秘籍】003 01背包问题详解.pptx
- 【动态规划秘籍】004 多重背包问题详解.pptx
- 【动态规划秘籍】005 区间动态规划详解.pptx
- 【动态规划秘籍】006 树形动态规划详解.pptx
- 【动态规划秘籍】007 动态规划优化详解 .pptx
- 课堂笔记.pptx
- Lectures
- 1. Review of Algorithms.pptx
- 10-11 Fair Division.pptx
- 12 Facility Location Games.pptx
- 13 Truthful Scheduling Mechanism.pdf
- 2. Approximation Algorithms (new).pptx
- 3. Online Algorithms (new).pptx
- 4. Randomized and Others.ppt
- 5. Game_Theory_Basics (new).pptx
- 5.3. Network Defending Games.pptx
- 6-7 Cooperative Games (new).pptx
- 8 Auction and matching (new).pptx
- Introduction.pptx
- Tutorials
- Bayesian game example.pdf
- Tutorial 1(written answer).pdf
- Tutorial 1.docx
- Tutorial 1.pdf
- Tutorial 2 midterm hints and notes.pdf
- Tutorial1 Q3 .pdf
- course_files_export.zip
- 参考资料
- 词汇表.xlsx
- 课堂笔记.pptx
- CS6491_Topics_In_Optimization_And_Applications_In_CS
- CS 6491 Topics in Opt.&App in CS
- Assignment
- CVX
- Lecture
- Program
- LP-Solver-master.zip
- LP-Solver-master
- LP-Solver
- ScreenshotsForA4
- Tutorial
- T4+A2.pdf
- T10+A4.pdf
- assign3+tutorial6.pdf
- L3+4.pdf
- LLM+EC.pptx
- T1+2-25.pdf
- T11.pdf
- T3-student.pdf
- t1.pdf
- t9.pdf
- tu5.pdf
- UsefulDocuments
- CS6493_Natural_Language_Processing
- Exercise
- GroupProject
- Homework
- Lectures
- L10_Efficient Training of LLM.pdf
- L11_RAG.pdf
- L12_CourseReview.pdf
- L1_Introduction.pdf
- L2_LanguageModel.pdf
- L3_WordEmbedding.pdf
- L4_Transformer and pretraining-finetuning.pdf
- L5_NLU tasks.pdf
- L6_NLG tasks.pdf
- L7_LLM.pdf
- L8_prompts_alignment.pdf
- L9_LLMAgents.pdf
- Syllabus
- Tutorials
- data.txt
- ner_datasetreference.csv
- tutorial_week10_Peft_&_LoRA.ipynb
- tutorial_week1_introduction.ipynb
- tutorial_week1_introduction_ansVersion.ipynb
- tutorial_week2_word_embeddings_and_language_model.ipynb
- tutorial_week3_word_embedding_2.ipynb
- tutorial_week4_finetuning_bert_for_sentiment_analysis.ipynb
- tutorial_week5_named_entity_recognition.ipynb
- tutorial_week6_machine_translation.ipynb
- tutorial_week7_language_model_for_text_generation.ipynb
- tutorial_week8_prompt_learning.ipynb
- tutorial_week9_Augmenting_LLMs_with_Tools.ipynb
- wiki_corpus.txt
- s00521-022-06887-1.pdf
- README.md
- compulsary_reading
- Cormen, Thomas H. & Leiserson, Charles E. & Rivest, Ronald L. & Stein, Clifford - Introduction to Algorithms-The MIT Press (2009).pdf
- James F. Kurose_ Keith W. Ross - Computer Networking_ A Top-down Approach-Pearson (2020).pdf
- Noam Nisan, Tim Roughgarden, Eva Tardos, Vijay V. Vazirani - Algorithmic game theory (2007, Cambridge University Press) - libgen.li.pdf
- PPT_textbook
- Computer Graphics with OpenGL (4th ed.) [Hearn, Baker & Carithers 2013].pdf
- a6A8H5_computer graphics.pdf
- Peter Harrington - Machine Learning in Action-Manning (2012).pdf
- Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein - Introduction to Algorithms-The MIT Press (2022).pdf
- William Stallings - Cryptography and Network Security_ Principles and Practice (2019, Pearson) - libgen.li.pdf
- William Stallings - Cryptography and Network Security_ Principles and Practice-Pearson (2014).pdf
- [图灵程序设计丛书] Peter Harrington - 机器学习实战 Machine Learning in Action (2013, 人民邮电出版社) - libgen.li.pdf
- compulsory_reading.png
- personal_recommend
- kimi相应promts.txt
- syllabus
- AY2024TO2025
- 原文_港城本部CS培养方案.pdf
- CS5182_Computer_Graphics.pdf
- CS5187_Vision_And_Image.pdf
- CS5222_Computer_Networks&Internets.pdf
- CS5285_Infor_Security_for_E-comm.pdf
- CS5351_Software_Engineering.pdf
- CS5481_Data_Engineering.pdf
- CS5486_Intelligent_Systems.pdf
- CS5489_Machine_Learning.pdf
- CS6290_Privacy_Enhancing_Technologies.pdf
- CS6382_Algorithm_Anal.&Game_Theory.pdf
- CS6491_Topics_in_Opt._and_its_Applications_in_CS.pdf
- CS6493_Natural_Language_Processing.pdf
- Syllabus_In_Sham_Shui_Po_Campus.pdf
- Syllabus_In_Song_Shan_Hu_Campus.pdf
- AY2025TO2026
- CS5222_ Computer_Networks_and_Internets.pdf
- CS5285_ Information_Security_for_eCommerce.pdf
- CS5351_ Software_Engineering.pdf
- CS5481_ Data_Engineering.pdf
- CS5489_ Machine_Learning_ Algorithms_and_Applications.pdf
- CS5491_ Artificial_Intelligence.pdf
- CS6535_ Guided_Study_in_Artificial_Intelligence.pdf
- Syllabus_In_Sham_Shui_Po_Campus.pdf
- Syllabus_In_Song_Shan_Hu_Campus.pdf
- university-calendar-2024-25.png
- 单词表_五合一.xlsx
- 疑问清单_四合一.xlsx
- 课堂录音稿
- week1
- CS5285信安-Lecture01.docx
- MLweek1
- ML_week1_lecture1_20240906_2024%E5%B9%B409%E6%9C%8806%E6%97%A511%E6%97%B636%E5%88%8642%E7%A7%92.docx
- ML_week1_lecture2_20240906.mp3
- ML_week1_lecture2_20240906_2024%E5%B9%B409%E6%9C%8806%E6%97%A511%E6%97%B637%E5%88%8644%E7%A7%92.docx
- 计网week1
- week2
- CGweek2_1-20240909_2024%E5%B9%B409%E6%9C%8813%E6%97%A509%E6%97%B621%E5%88%8621%E7%A7%92.docx
- CGweek2_2-20240909.mp3
- CGweek2_2-20240909_2024%E5%B9%B409%E6%9C%8813%E6%97%A509%E6%97%B621%E5%88%8638%E7%A7%92.docx
- ML_week2_lecture2_1-20240913.mp3
- ML_week2_lecture2_1-20240913_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B656%E5%88%8616%E7%A7%92.docx
- ML_week2_lecture2_2-20240913.mp3
- ML_week2_lecture2_2-20240913_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B656%E5%88%8648%E7%A7%92.docx
- algorithm_week2_1-20240909.mp3
- algorithm_week2_1-20240909_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B621%E5%88%8605%E7%A7%92.docx
- algorithm_week2_2-20240909.mp3
- algorithm_week2_2-20240909_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B621%E5%88%8640%E7%A7%92.docx
- algorithm_week2_3-20240909.mp3
- algorithm_week2_3-20240909_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B650%E5%88%8651%E7%A7%92.docx
- network_week2_lec2_2-20240912.mp3
- network_week2_lec2_2-20240912_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B655%E5%88%8615%E7%A7%92.docx
- network_week2_lecture1lec2_1-20240912.mp3
- network_week2_lecture1lec2_1-20240912_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B654%E5%88%8647%E7%A7%92.docx
- network_week2_tutorial2-20240912.mp3
- network_week2_tutorial2-20240912_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B655%E5%88%8648%E7%A7%92.docx
- security_week2_1-20240910.mp3
- security_week2_1-20240910_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B651%E5%88%8622%E7%A7%92.docx
- security_week2_2-20240910.mp3
- security_week2_2-20240910_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B651%E5%88%8653%E7%A7%92.docx
- security_week2_tutorial1-20240910.mp3
- security_week2_tutorial1-20240910_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B652%E5%88%8647%E7%A7%92.docx
- week3
- Algorithms_week3_lecture2_1-20240914_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B613%E5%88%8659%E7%A7%92.docx
- Algorithms_week3_lecture2_2-20240914.mp3
- Algorithms_week3_lecture2_2-20240914_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B613%E5%88%8625%E7%A7%92.docx
- Algorithms_week3_lecture2_3-20240914.mp3
- Algorithms_week3_lecture2_3-20240914_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B612%E5%88%8644%E7%A7%92.docx
- CG_week3_lecture2_1-20240914.mp3
- CG_week3_lecture2_1-20240914_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B619%E5%88%8638%E7%A7%92.docx
- CG_week3_lecture2_2-20240914.mp3
- CG_week3_lecture2_2-20240914_2024%E5%B9%B409%E6%9C%8814%E6%97%A523%E6%97%B614%E5%88%8634%E7%A7%92.docx
- ML
- ML_week3_lecture3_1-20240920_2024%E5%B9%B409%E6%9C%8820%E6%97%A517%E6%97%B604%E5%88%8625%E7%A7%92.docx
- ML_week3_lecture3_2-20240920.wav
- ML_week3_lecture3_2-20240920_2024%E5%B9%B409%E6%9C%8820%E6%97%A517%E6%97%B606%E5%88%8648%E7%A7%92.docx
- network
- Network_week3_lecture3_1-2-20240919_2024%E5%B9%B409%E6%9C%8819%E6%97%A513%E6%97%B613%E5%88%8609%E7%A7%92.docx
- Network_week3_lecture3_1-20240919.mp3
- Network_week3_lecture3_1-20240919_2024%E5%B9%B409%E6%9C%8819%E6%97%A513%E6%97%B611%E5%88%8657%E7%A7%92.docx
- Network_week3_lecture3_3-20240919.mp3
- Network_week3_lecture3_3-20240919_2024%E5%B9%B409%E6%9C%8819%E6%97%A513%E6%97%B613%E5%88%8653%E7%A7%92.docx
- Network_week3_lecture3_4-20240919.mp3
- Network_week3_lecture3_4-20240919_2024%E5%B9%B409%E6%9C%8819%E6%97%A513%E6%97%B614%E5%88%8633%E7%A7%92.docx
- Network_week3_tutorial3-20240919.mp3
- Network_week3_tutorial3-20240919_2024%E5%B9%B409%E6%9C%8819%E6%97%A513%E6%97%B615%E5%88%8605%E7%A7%92.docx
- week4
- AL_week4_lecture_1-20240923.mp3
- AL_week4_lecture_1-20240923_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B638%E5%88%8616%E7%A7%92.docx
- AL_week4_lecture_2-20240923.mp3
- AL_week4_lecture_2-20240923_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B640%E5%88%8627%E7%A7%92.docx
- AL_week4_lecture_3-20240923.mp3
- AL_week4_lecture_3-20240923_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B642%E5%88%8626%E7%A7%92.docx
- CG_week4_lecture3_1-20240923.mp3
- CG_week4_lecture3_1-20240923_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B630%E5%88%8652%E7%A7%92.docx
- CG_week4_lecture3_1.5-20240923_9%E6%9C%8823%E6%97%A509%EF%BC%9A_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B634%E5%88%8627%E7%A7%92.docx
- Security_week4_lecture_1-20240924.mp3
- CG_week4_lecture3_2-20240923.mp3
- CG_week4_lecture3_2-20240923_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B635%E5%88%8602%E7%A7%92.docx
- Network_week4_lec4-1-20240926.mp3
- Network_week4_lec4-1-20240926_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B654%E5%88%8603%E7%A7%92.docx
- Network_week4_lec4-2-20240926.mp3
- Network_week4_lec4-2-20240926_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B655%E5%88%8656%E7%A7%92.docx
- Network_week4_tutorial4-20240926.mp3
- Network_week4_tutorial4-20240926_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B657%E5%88%8652%E7%A7%92.docx
- Security_week4_lecture_1-20240924_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B644%E5%88%8643%E7%A7%92.docx
- Security_week4_lecture_2-20240924.mp3
- Security_week4_lecture_2-20240924_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B650%E5%88%8648%E7%A7%92.docx
- Security_week4_tu-20240924.mp3
- Security_week4_tu-20240924_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B650%E5%88%8618%E7%A7%92.docx
- week5
- 0929补week3- Security
- Security_week5_lec1%E6%95%B0%E8%AE%BA%E5%9F%BA%E7%A1%80-20240929_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B623%E5%88%8616%E7%A7%92.docx
- Security_week5_lec2%E9%9D%9E%E5%AF%B9%E7%A7%B0%E5%8A%A0%E5%AF%86-20240929.mp3
- Security_week5_lec2%E9%9D%9E%E5%AF%B9%E7%A7%B0%E5%8A%A0%E5%AF%86-20240929_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B622%E5%88%8641%E7%A7%92.docx
- 20241008-1012
- Security_week5_Lec5_1-20241008.mp3
- Security_week5_Lec5_1-20241008_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B608%E5%88%8611%E7%A7%92.docx
- Security_week5_Lec5_2-20241008.mp3
- Security_week5_Lec5_2-20241008_2024%E5%B9%B410%E6%9C%8810%E6%97%A500%E6%97%B609%E5%88%8638%E7%A7%92.docx
- AL_week5_lec5gametheory_1-20241012.mp3
- AL_week5_lec5gametheory_1-20241012_2024%E5%B9%B410%E6%9C%8813%E6%97%A512%E6%97%B608%E5%88%8657%E7%A7%92.docx
- AL_week5_lec5gametheory_2tuBayesNash-20241012.mp3
- AL_week5_lec5gametheory_2tuBayesNash-202_2024%E5%B9%B410%E6%9C%8813%E6%97%A512%E6%97%B612%E5%88%8633%E7%A7%92.docx
- CG_week5_lec5Cliping_1-20241012.mp3
- CG_week5_lec5Cliping_1-20241012_2024%E5%B9%B410%E6%9C%8813%E6%97%A512%E6%97%B600%E5%88%8656%E7%A7%92.docx
- CG_week5_lec5Cliping_2-20241012.mp3
- CG_week5_lec5Cliping_2-20241012_2024%E5%B9%B410%E6%9C%8813%E6%97%A512%E6%97%B605%E5%88%8601%E7%A7%92.docx
- CG_week5_tu05face_restruction_1-20241012.mp3
- CG_week5_tu05face_restruction_1-20241012_2024%E5%B9%B410%E6%9C%8813%E6%97%A512%E6%97%B606%E5%88%8602%E7%A7%92.docx
- CG_week5_TutorialTensorflow-20240930.mp3
- CG_week5_TutorialTensorflow-20240930_2024%E5%B9%B410%E6%9C%8805%E6%97%A500%E6%97%B632%E5%88%8628%E7%A7%92.docx
- CG_week5_lec2Transformation-20240930.mp3
- CG_week5_lec2Transformation-20240930_2024%E5%B9%B410%E6%9C%8805%E6%97%A500%E6%97%B635%E5%88%8632%E7%A7%92.docx
- week6
- AL_week6_lec6TUgame1-20241014_2024%E5%B9%B410%E6%9C%8814%E6%97%A521%E6%97%B645%E5%88%8627%E7%A7%92.docx
- AL_week6_lec6TUgame2-20241014.mp3
- AL_week6_lec6TUgame2-20241014_2024%E5%B9%B410%E6%9C%8814%E6%97%A521%E6%97%B648%E5%88%8627%E7%A7%92.docx
- AL_week6_lec6TUgame3_tu_timespan-20241014.mp3
- AL_week6_lec6TUgame3_tu_timespan-2024101_2024%E5%B9%B410%E6%9C%8814%E6%97%A521%E6%97%B653%E5%88%8612%E7%A7%92.docx
- CG_week6_lec5HiddenSurfaceRemoval_1-20241014.mp3
- CG_week6_lec5HiddenSurfaceRemoval_1-2024_2024%E5%B9%B410%E6%9C%8814%E6%97%A510%E6%97%B638%E5%88%8617%E7%A7%92.docx
- CG_week6_lec5Illumination_Shading-20241014.mp3
- CG_week6_lec5Illumination_Shading-202410_2024%E5%B9%B410%E6%9C%8814%E6%97%A510%E6%97%B649%E5%88%8624%E7%A7%92.docx
- CG_week6_tu5-20241014.mp3
- CG_week6_tu5-20241014_2024%E5%B9%B410%E6%9C%8814%E6%97%A512%E6%97%B629%E5%88%8649%E7%A7%92.docx
- Security_week6_lec6Authenty-20241015.mp3
- Security_week6_lec6Authenty-20241015_2024%E5%B9%B410%E6%9C%8815%E6%97%A519%E6%97%B603%E5%88%8632%E7%A7%92.docx
- Security_week6_lec6Authenty2-20241015.mp3
- Security_week6_lec6Authenty2-20241015_2024%E5%B9%B410%E6%9C%8815%E6%97%A519%E6%97%B604%E5%88%8624%E7%A7%92.docx
- Security_week6_tu5-20241015.mp3
- Security_week6_tu5-20241015_2024%E5%B9%B410%E6%9C%8815%E6%97%A519%E6%97%B607%E5%88%8628%E7%A7%92.docx
- week7
- Algorithm_week7_lec01-20241021_14%EF%BC%9A07_2024%E5%B9%B411%E6%9C%8807%E6%97%A500%E6%97%B602%E5%88%8616%E7%A7%92.docx
- Algorithm_week7_lec01-20241021_14-07.mp3
- Algorithm_week7_lec02-20241021_15%EF%BC%9A04_2024%E5%B9%B411%E6%9C%8807%E6%97%A500%E6%97%B604%E5%88%8641%E7%A7%92.docx
- Algorithm_week7_lec02-20241021_15-04.mp3
- Algorithm_week7_lec03-20241021_16%EF%BC%9A01_2024%E5%B9%B411%E6%9C%8807%E6%97%A500%E6%97%B605%E5%88%8632%E7%A7%92.docx
- Algorithm_week7_lec03-20241021_16-01.mp3
- week8
- Algorithm_Tutorial_before_midterm_assign_2024%E5%B9%B411%E6%9C%8806%E6%97%A523%E6%97%B624%E5%88%8649%E7%A7%92.docx
- Algorithm_Tutorial_before_midterm_assignmentAndInclassQuestion_20241031_14-05.mp3
- ML_week8_lec02-20241101.mp3
- ML_week8_lec02-20241101_2024%E5%B9%B411%E6%9C%8806%E6%97%A523%E6%97%B628%E5%88%8623%E7%A7%92.docx
- Network_week8_lec02-20241031.mp3
- Network_week8_lec02-20241031_2024%E5%B9%B411%E6%9C%8806%E6%97%A523%E6%97%B622%E5%88%8601%E7%A7%92.docx
- Network_week8_tutorial-20241031.mp3
- Network_week8_tutorial-20241031_2024%E5%B9%B411%E6%9C%8806%E6%97%A523%E6%97%B622%E5%88%8645%E7%A7%92.docx
- Security_week8_lec01-20241029_14%EF%BC%9A08_2024%E5%B9%B411%E6%9C%8806%E6%97%A523%E6%97%B616%E5%88%8633%E7%A7%92.docx
- Security_week8_lec01-20241029_14-08.mp3
- Security_week8_lec02-20241029_14%EF%BC%9A50_2024%E5%B9%B411%E6%9C%8806%E6%97%A523%E6%97%B617%E5%88%8638%E7%A7%92.docx
- Security_week8_lec02-20241029_14-50.mp3
- Security_week8_lec02.2-20241029_15%EF%BC%9A12_2024%E5%B9%B411%E6%9C%8806%E6%97%A523%E6%97%B618%E5%88%8614%E7%A7%92.docx
- Security_week8_lec02.2-20241029_15-12.mp3
- Security_week8_tutorial-20241029_16%EF%BC%9A32_2024%E5%B9%B411%E6%9C%8806%E6%97%A523%E6%97%B618%E5%88%8640%E7%A7%92.docx
- Security_week8_tutorial-20241029_16-32.mp3
- week9
- W9_Security_lec01睡过头_omited
- Algorithm_week9_lec01-20241104_2024%E5%B9%B411%E6%9C%8806%E6%97%A521%E6%97%B624%E5%88%8625%E7%A7%92.docx
- Algorithm_week9_lec02-20241104.mp3
- Algorithm_week9_lec02-20241104_2024%E5%B9%B411%E6%9C%8806%E6%97%A521%E6%97%B625%E5%88%8611%E7%A7%92.docx
- Algorithm_week9_lec03-20241104.mp3
- Algorithm_week9_lec03-20241104_2024%E5%B9%B411%E6%9C%8806%E6%97%A521%E6%97%B626%E5%88%8638%E7%A7%92.docx
- Security_week9_lec02%2Clec01%E6%B2%A1%E6%9D%A5-20241105.mp3
- Security_week9_lec02%2Clec01%E6%B2%A1%E6%9D%A5-20241105_2024%E5%B9%B411%E6%9C%8806%E6%97%A521%E6%97%B620%E5%88%8624%E7%A7%92.docx
- Security_week9_tutorial-20241105.mp3
- Security_week9_tutorial-20241105_2024%E5%B9%B411%E6%9C%8806%E6%97%A521%E6%97%B622%E5%88%8626%E7%A7%92.docx
- 课程信息整合.xlsx
- 课表.png
所有权归 github.com/monkeywoora/cityu-dg-cs 拥有。本站仅提供github文件链接,不对仓库内容负责