HK CODE
|
์ฐธ๊ณ ๋ฆฌ๋
์ค์ ์๋์ฝ๋ค ์ค์นํ๊ธฐ ํํธ1 ๋ฆฌ๋
์ค ์ค์น
|
2020-05-05 17:59:51
|
2025-02-11 18:05:28
|
x
|
์ฌ์ด์ฝ๋
|
Java์์ SortedMap ์ ์์ ํน์ง ; HashMap๊ณผ์ ์ฐจ์ด ; ๊ตฌํ์ฒด๋ค
|
2020-05-05 09:40:19
|
2025-02-13 22:05:28
|
x
|
๋ฐ๋ธ์์ DVWY
|
Confluent์ Kafka cloud์๋น์ค๋ฅผ ์๊ฐํฉ๋๋ค!
|
2020-05-01 18:39:25
|
2024-05-16 23:31:01
|
x
|
Kyeongrok Kim
|
[์ง๋ฌธ๋ต๋ณ] ํน์ ์ด ๊ธฐ์ค์ผ๋ก ๋ฐ์ดํฐ ํฉ์น๊ธฐ .groupby() .agg()
|
2020-04-30 13:00:43
|
2025-05-29 17:05:28
|
x
|
์ํํ ์ฝ๋ฉ์ฌ์
|
PWA๊ฐ ๋ญ๊ฐ์? (+๋ชจ๋ฐ์ผ ์ฑ์ ์ข
๋ฅ)
|
2020-04-30 03:17:36
|
2024-05-23 02:05:29
|
x
|
Kyeongrok Kim
|
04 CSVํ์ผ์ ๊ตฌ์กฐ์ ๋ํด ์์๋ณด์
|
2020-04-28 23:08:59
|
2025-05-29 17:05:28
|
x
|
์ฝ๋ฉ์ ์ ์์ฌ
|
ํต์ํธ, ๋จธ์ง์ํธ ์๊ฐ ๋ณต์ก๋ ์ฝ๊ฒ ์ธ์ฐ๊ธฐ
|
2020-04-26 21:00:14
|
2024-06-25 00:16:58
|
x
|
Kyeongrok Kim
|
03 Pycharm์์ git cloneํ๊ธฐ
|
2020-04-24 15:58:52
|
2025-05-29 17:05:28
|
x
|
Kyeongrok Kim
|
02 Python ํ๋ก์ ํธ ์์ฑํ๊ณ hello์ถ๋ ฅํ๊ธฐ
|
2020-04-23 12:57:52
|
2025-05-29 17:05:28
|
x
|
์ฝ๋ฉ์ ์ ์์ฌ
|
ํจ๊ป ์ผํ๊ณ ์ถ์ ๊ฐ๋ฐ์
|
2020-04-22 23:15:12
|
2024-06-25 00:16:58
|
x
|
Kyeongrok Kim
|
01 Python Pandas ๊ฐ๋ฐํ๊ฒฝ ๊ตฌ์ถํ๊ธฐ
|
2020-04-22 19:29:13
|
2025-05-29 17:05:28
|
x
|
Kyeongrok Kim
|
JAVA Extends(์์)๋ก ์๋ฉ๋ฆฌ์นด๋
ธ ๋จธ์ ๊ณผ ๋ผ๋ผ ๋จธ์ ๋ง๋ค๊ธฐ
|
2020-04-19 22:45:10
|
2025-05-29 17:05:28
|
x
|
์ฝ๋ฉ์ ์ ์์ฌ
|
๋ฌธ์ -ํด๊ฒฐ-๋ฐ์ฑ ์ฑ์ฅ ์ธ์ดํด
|
2020-04-19 20:30:12
|
2024-06-25 00:16:58
|
x
|
๊ฐ์ฅ ์ฌ์ด ์น๊ฐ๋ฐ with Boaz
|
Browser rendering process 2ํธ - ๋ ๋๋ง ์์ง ๋์๊ณผ์
|
2020-04-17 19:01:27
|
2024-05-16 23:31:04
|
x
|
๊ฐ์ฅ ์ฌ์ด ์น๊ฐ๋ฐ with Boaz
|
Browser rendering process 1ํธ - Browser ๊ตฌ์ฑ ์์
|
2020-04-15 20:49:02
|
2024-05-16 23:31:04
|
x
|
์ด๋
ธ๋ฒ ์ด์
์์นด๋ฐ๋ฏธ
|
[์ด๋
ธ๋ฒ ์ด์
์์นด๋ฐ๋ฏธ] ๋ฐฉ๊ตฌ์ ๋ฒ๊ฝ๋์ด with ์ด๋
ธ๋ฒ ์ด์
์์นด๋ฐ๋ฏธ / ๋ฒ๊ฝ๋ง์ง / ๋์ ๋๋ค์ด / ์ฌํ์ ๊ฑฐ๋ฆฌ๋๊ธฐ
|
2020-04-09 11:23:07
|
2025-06-12 20:05:28
|
x
|
Kyeongrok Kim
|
[์ง๋ฌธ๋ต๋ณ] Python Pandas(ํ์ด์ฌ ํ๋ค์ค)๋ก ํผ๋ฒํ
์ด๋ธ ๊ตฌํํ๊ธฐ
|
2020-04-09 10:30:28
|
2025-05-29 17:05:28
|
x
|
๋ฐ๋ธ์์ DVWY
|
๊ฐ๋ฐ ์์ฐ์ฑ์ ๋์ฌ์ฃผ๋ 3๊ฐ์ง ์์ดํ
. ๋ฐ์ดํฐ ์์ง๋์ด๊ฐ ์ ํํ ํค๋ณด๋, ๋ง์ฐ์ค, ์ด์ดํฐ!
|
2020-04-04 11:22:33
|
2024-05-16 23:31:01
|
x
|
Kyeongrok Kim
|
ํ ํฌ์๋ฅผ ์ํ ํ ๋น์ ์คํ๋ง3 54~93ํ์ด์ง(Factory) ๋ฐ๋ผํ๊ธฐ
|
2020-04-04 03:43:01
|
2025-05-29 17:05:28
|
x
|
๋๋น๋
|
[๊ผผ๊ผผํ ๋
ผ๋ฌธ ๋ฆฌ๋ทฐ] Constructing Unrestricted Adversarial Examples with Generative Models [NIPS 2018] (AI๋ณด์)
|
2020-03-30 20:15:01
|
2024-05-16 23:31:00
|
x
|
Kyeongrok Kim
|
ํ์ด์ฌ์ผ๋ก ๋จธ๋๊ฒ์์ ๋ง๋ค์ด๋ณด์ - 01 ํธ๊ฐ๋ ์ฌ๋ฆฌ๊ณ ๋ด๋ฆฌ๊ธฐ, ๋ ์ฌ๋ฆฌ๊ณ ๋ด๋ฆฌ๊ธฐ ๊ตฌํํ๊ธฐ
|
2020-03-29 01:33:21
|
2025-05-29 17:05:28
|
x
|
๋๋น๋
|
[๊ผผ๊ผผํ ๋
ผ๋ฌธ ๋ฆฌ๋ทฐ] Obfuscated Gradients Give a False Sense of Security [ICML 2018] (์ธ๊ณต์ง๋ฅ ๋ณด์)
|
2020-03-27 21:30:01
|
2024-05-16 23:31:00
|
x
|
์ฌ์ด์ฝ๋
|
Set, HashSet ์ค๋ช
|
2020-03-27 07:46:19
|
2025-02-13 22:05:28
|
x
|
Kyeongrok Kim
|
[19๊ธ]ํ์ด์ฌ์ผ๋ก ๋จธ๋ ๊ฒ์ ๋ง๋ค์ด๋ณด์ - 01 ํ๋ก์ ํธ ์์ฑ/๋์ฌ ๊ตฌํํ๊ธฐ
|
2020-03-26 01:14:36
|
2025-05-29 17:05:28
|
x
|
์ด๋
ธ๋ฒ ์ด์
์์นด๋ฐ๋ฏธ
|
[42 SEOUL] EP.02 ์ฒซ๋ฒ์งธ ์ง์ค๊ต์ก(๋ผํผ์ ) 4์ฃผ๊ฐ์ ๊ธฐ๋ก, ๋ฐ์ฐฉ ์์
|
2020-03-24 16:13:24
|
2025-06-12 20:05:28
|
x
|
์ด๋
ธ๋ฒ ์ด์
์์นด๋ฐ๋ฏธ
|
[42 SEOUL] EP.01 ์ฒซ๋ฒ์งธ ์ง์ค๊ต์ก(๋ผํผ์ ) 4์ฃผ๊ฐ์ ๊ธฐ๋ก, ๋ฐ์ฐฉ ์์
|
2020-03-23 16:07:14
|
2025-06-12 20:05:28
|
x
|
Kyeongrok Kim
|
์ฑ๊ฐํด ์ทจ์
๋์ 2๋ฌ ํ๊ธฐ
|
2020-03-23 01:19:32
|
2025-05-29 17:05:28
|
x
|
์ฝ๋ฉ์ ์ ์์ฌ
|
Spring Boot 2.2 ํ๋ก์ ํธ ์์ํ๊ธฐ
|
2020-03-22 22:00:17
|
2024-06-25 00:16:58
|
x
|
์ฝ์ค์
|
[Python ๊ธฐ์ด] ์์ฐฝ๊ณผ ์๋ํฐ์ฐฝ์ ์ฐจ์ด๋ฅผ ์์๋ณด์
|
2020-03-22 17:31:01
|
2024-07-15 20:49:34
|
x
|
๋ฐ๋ธ์์ DVWY
|
AWS์ ์นดํ์นด ํด๋ฌ์คํฐ๋ฅผ ์ค์น, ์คํํด๋ณด๊ธฐ!
|
2020-03-19 22:14:01
|
2024-05-16 23:31:01
|
x
|
๋๋น๋
|
[๊ผผ๊ผผํ ๋
ผ๋ฌธ ๋ฆฌ๋ทฐ] Certified Robustness to Adversarial Examples with Differential Privacy [S&P 2019] (AI๋ณด์)
|
2020-03-19 22:00:18
|
2024-05-16 23:31:00
|
x
|
Kyeongrok Kim
|
์ต๋๊ฐ ์ต์๊ฐ(max, min) ๊ตฌํ๋ ์๊ณ ๋ฆฌ์ฆ ๋ง๋ค์ด๋ณด๊ณ ์ต์ ํ ํ๊ธฐ
|
2020-03-16 09:46:41
|
2025-05-29 17:05:28
|
x
|
์ํํ ์ฝ๋ฉ์ฌ์
|
์ฝ๋ก๋ ๋ง์คํฌ ์ฌ๊ณ ํ์ธ ์ฑ - ์ฐ๋ฆฌ๋๋ค ๋ง์คํฌ
|
2020-03-15 04:10:15
|
2024-05-23 02:05:29
|
x
|
๋๋น๋
|
[๊ผผ๊ผผํ ๋
ผ๋ฌธ ๋ฆฌ๋ทฐ] Towards Deep Learning Models Resistant to Adversarial Attacks [ICLR 2018] (์ธ๊ณต์ง๋ฅ ๋ณด์)
|
2020-03-08 21:00:00
|
2024-05-16 23:31:00
|
x
|
๋๋น๋
|
์์ฐ๋์ e(Euler's number) | ์ธ๊ณต์ง๋ฅ ๋ฐ ์ปดํจํฐ ๋น์ ์ ์ํ ์ํ ํต์ฌ ๊ฐ๋
๋
ธํธ(Mathematics for AI)
|
2020-03-08 16:48:51
|
2024-05-16 23:31:00
|
x
|
์ํํ ์ฝ๋ฉ์ฌ์
|
[์ฝ๋ฉ๋งํ] Scope๊ฐ ๋ญ๊ฐ์? (feat: let, const, var์ ์ฐจ์ด)
|
2020-03-07 04:09:37
|
2024-05-23 02:05:29
|
x
|
๋๋น๋
|
[๊ผผ๊ผผํ ๋
ผ๋ฌธ ๋ฆฌ๋ทฐ] Adversarial Examples Are Not Bugs, They Are Features [NIPS 2019] (์ธ๊ณต์ง๋ฅ ๋ณด์)
|
2020-03-06 22:31:49
|
2024-05-16 23:31:00
|
x
|
๋ฐ๋ธ๋ฉํ (Devmento : Real IT Portal)
|
๋ก๋ณด์ด๋๋ฐ์ด์ ๋ฅผ ํ๊ฐ ๋ถ์ํด์ฃผ๋ RAํ๋ธ (์ด๊ธฐ์ ๋ํ ์ธํฐ๋ทฐ)
|
2020-03-06 08:37:30
|
2024-05-16 23:31:10
|
x
|
๋ฐ๋ธ๋ฉํ (Devmento : Real IT Portal)
|
์จ์คํ๋ผ์ธ ํ๋ฆฌ ๊ด๋ฆฌ ์ฝ์นญ์๋น์ค, ๋ฆด๋ฆฌ๋ธ (๊น๋ณ์ค ๋ํ ์ธํฐ๋ทฐ)
|
2020-03-06 08:34:38
|
2024-05-16 23:31:10
|
x
|
๋ฐ๋ธ๋ฉํ (Devmento : Real IT Portal)
|
๊ธฐ์ดํ์ฅํ ์ฐฝ์
์ด์ผ๊ธฐ: ๋ฆฌ๋ฉ์ฝ์ค, ๊ธฐ์ดํ์ฅํ์ ๋ณธ์ง์ ์๊ฐํ๋ค (๊น๊ธฐ์ ์ฌ๋ฆฌํฌ์ ์ฝ์ค๋ฉํฑ์ค ๋ํ)
|
2020-03-05 11:15:22
|
2024-05-16 23:31:10
|
x
|
๋ฐ๋ธ๋ฉํ (Devmento : Real IT Portal)
|
์ด๋ฏธ์ธ ๋จผ์ง ๋ง์ผ๋ ค๋ฉด ์ ์ด๊ตํ๊ธฐ ํํฐ ๊ต์ฒดํด์ผ(์ ํญ์ฉ ๋ ์ด๋
ธ ๋ํ ์ธํฐ๋ทฐ)
|
2020-03-03 17:23:47
|
2024-05-16 23:31:10
|
x
|
๋ฐ๋ธ๋ฉํ (Devmento : Real IT Portal)
|
ํฅ๊ธฐ ๋๋ ๋์ ํ์ค โ์ฐจํฌ๋ผโ๋ก ํด์ธ ์ง์ถ ์๋ ๊ฑด๋ค(๋ฐ์ฌ์ฑ ๋ฌด๋์คํ๋์ค ๋ํ)
|
2020-03-02 10:53:18
|
2024-05-16 23:31:10
|
x
|
๋ฐ๋ธ์์ DVWY
|
Burrow = ์นดํ์นด ์ปจ์๋จธ Lag ๋ชจ๋ํฐ๋ง ํ์์์
|
2020-03-01 00:16:46
|
2024-05-16 23:31:01
|
x
|
๋๋น๋
|
๋ฏธ๋ถ๊ณผ ํธ๋ฏธ๋ถ(Ordinary Derivative & Partial Derivative) | ์ธ๊ณต์ง๋ฅ ๋ฐ ์ปดํจํฐ ๋น์ ์ ์ํ ์ํ ํต์ฌ ๊ฐ๋
๋
ธํธ(Mathematics for AI)
|
2020-03-01 00:04:58
|
2024-05-16 23:31:00
|
x
|
๋๋น๋
|
[๊ผผ๊ผผํ ๋
ผ๋ฌธ ๋ฆฌ๋ทฐ] Towards Evaluating the Robustness of Neural Networks [S&P 2017] (์ธ๊ณต์ง๋ฅ ๋ณด์/AI Security)
|
2020-02-28 20:04:04
|
2024-05-16 23:31:00
|
x
|
๋ฐ๋ธ๋ฉํ (Devmento : Real IT Portal)
|
๋ชฉ์๋ฆฌ ๊ด๋ฆฌํ๋ O2O ์๋น์ค โ๋ณด์ด์ค์ฒตโ (๋ฐํ์ ๋ณด์ด์ค์ฒต ๋ํ ์ธํฐ๋ทฐ)
|
2020-02-28 14:03:18
|
2024-05-16 23:31:10
|
x
|
์ฝ์ค์
|
[Python] #2 ๋งค์ฐ ์ฝ๊ฒ ํ์ด๋ธ tkinter ๊ฐ์ - ์ฌ์ฉํ๊ธฐ ์ฌ์ด ์ฝ๋๋ก GUIํ๋ก๊ทธ๋จ ๋ง๋ค๊ธฐ๊น์ง
|
2020-02-26 18:19:43
|
2024-07-15 20:49:34
|
x
|
์ฝ์ค์
|
[Python] #1 ๋งค์ฐ ์ฝ๊ฒ ํ์ด๋ธ tkinter ๊ฐ์ - ์ฌ์ฉํ๊ธฐ ์ฌ์ด ์ฝ๋๋ก GUIํ๋ก๊ทธ๋จ ๋ง๋ค๊ธฐ๊น์ง
|
2020-02-26 18:10:32
|
2024-07-15 20:49:34
|
x
|
๋๋น๋
|
๋ณผ๋ก ํจ์(Convex Function) | ์ธ๊ณต์ง๋ฅ ๋ฐ ์ปดํจํฐ ๋น์ ์ ์ํ ์ํ ํต์ฌ ๊ฐ๋
๋
ธํธ(Mathematics for AI)
|
2020-02-26 08:30:01
|
2024-05-16 23:31:00
|
x
|
๋๋น๋
|
๋ดํด ๋ฐฉ๋ฒ(Newton Method) | ์ธ๊ณต์ง๋ฅ ๋ฐ ์ปดํจํฐ ๋น์ ์ ์ํ ์ํ ํต์ฌ ๊ฐ๋
๋
ธํธ(Mathematics for AI)
|
2020-02-24 21:00:07
|
2024-05-16 23:31:00
|
x
|
Hyun-woo Park
|
One day dev / ํ๋ฃจ๊ฐ๋ฐ โ ๋ฐ์ด๋ธ(dable) ํธ
|
2020-02-22 19:30:02
|
2024-06-09 10:15:24
|
x
|
๋๋น๋
|
๋ฅ ํ์ดํฌ(Deepfakes) ์ต์ ์ฐ๊ตฌ ๋ํฅ - ๊ฐ์ง ์์ ์ ์๊ณผ ํ์ง ๊ธฐ์ ์ ๋ฆฌ(Deep Learning for Deepfakes Creation and Detection)
|
2020-02-22 18:01:19
|
2024-05-16 23:31:00
|
x
|
๋๋น๋
|
[๊ผผ๊ผผํ ๋
ผ๋ฌธ ๋ฆฌ๋ทฐ] Explaining and Harnessing Adversarial Examples [ICLR 2015] (์ธ๊ณต์ง๋ฅ ๋ณด์/AI Security)
|
2020-02-19 21:00:01
|
2024-05-16 23:31:00
|
x
|
๋ฐ๋ธ๋ฉํ (Devmento : Real IT Portal)
|
์ผ์๊ทธ๋ฃน RPA ๋์
์ฌ๋ก: ์ผ์๊ทธ๋ฃน RPA 1์ฐจ ํ๋ก์ ํธ ๊ทธ ํ (1 of 2) (์ํ์ฒ ๊ณผ์ฅ ๋ฐํ)
|
2020-02-19 16:29:15
|
2024-05-16 23:31:10
|
x
|
๋ฐ๋ธ๋ฉํ (Devmento : Real IT Portal)
|
์ผ์๊ทธ๋ฃน RPA ๋์
์ฌ๋ก : ์ผ์๊ทธ๋ฃน RPA 1์ฐจ ํ๋ก์ ํธ ๊ทธ ํ (2 of 2) (์ํ์ฒ ๊ณผ์ฅ ๊ฐ์ฐ)
|
2020-02-19 16:24:54
|
2024-05-16 23:31:10
|
x
|
์ฌ์ด์ฝ๋
|
hash map ์ค๋ช
(์ฅ์ , ์์ , hash function)
|
2020-02-16 22:35:26
|
2025-02-13 22:05:28
|
x
|
Kyeongrok Kim
|
CSV Parsing and Sorting with Python
|
2020-02-15 11:55:12
|
2025-05-29 17:05:28
|
x
|
๋ฐ๋ธ๋ฉํ (Devmento : Real IT Portal)
|
๋ง์ดํฌ๋ก ๋ชจ๋น๋ฆฌํฐ ํํฉ (์ ๋ ํฅ๋ณด๋ ๋ฑ ๋ง์ดํฌ๋ก๋ชจ๋น๋ฆฌํฐ๋ ์ ์ฆ๊ฐํ ๊น? ), ์ต์์ฐ ์ธ๋ฃฐ๋ก(ํฅ๊ณ ์) ๋ํ ๋ฐํ
|
2020-02-12 09:11:35
|
2024-05-16 23:31:10
|
x
|
์ฌ์ด์ฝ๋
|
๋ฐฐ์ด์ด 0๋ฒ์งธ ๋ถํฐ ์์ํ๋ ์ด์
|
2020-02-10 21:30:02
|
2025-02-13 22:05:28
|
x
|
์ฌ์ด์ฝ๋
|
ํด์ค! 10000000 ์ญ์ง์๋ก ๋ฐ๊พธ๋ฉด?!
|
2020-02-07 22:09:58
|
2025-02-13 22:05:28
|
x
|